Interconnecting Cisco Networking Devices Part...

380
ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0 Student Guide Editorial, Production, and Web Services: 07.25.07 The PDF files and any printed representation for this material are the property of Cisco Systems, Inc., for the sole use by Cisco employees for personal study. The files or printed representations may not be used in commercial training, and may not be distributed for purposes other than individual self-study.

Transcript of Interconnecting Cisco Networking Devices Part...

Page 1: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

ICND1

Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

Student Guide

Editorial, Production, and Web Services: 07.25.07

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 2: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

DISCLAIMER WARRANTY: THIS CONTENT IS BEING PROVIDED “AS IS.” CISCO MAKES AND YOU RECEIVE NO WARRANTIES IN CONNECTION WITH THE CONTENT PROVIDED HEREUNDER, EXPRESS, IMPLIED, STATUTORY OR IN ANY OTHER PROVISION OF THIS CONTENT OR COMMUNICATION BETWEEN CISCO AND YOU. CISCO SPECIFICALLY DISCLAIMS ALL IMPLIED WARRANTIES, INCLUDING WARRANTIES OF MERCHANTABILITY, NON-INFRINGEMENT AND FITNESS FOR A PARTICULAR PURPOSE, OR ARISING FROM A COURSE OF DEALING, USAGE OR TRADE PRACTICE. This learning product may contain early release content, and while Cisco believes it to be accurate, it falls subject to the disclaimer above.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 3: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

Students, this letter describes important course evaluation access information!

Welcome to Cisco Systems Learning. Through the Cisco Learning Partner Program, Cisco Systems is committed to bringing you the highest-quality training in the industry. Cisco learning products are designed to advance your professional goals and give you the expertise you need to build and maintain strategic networks.

Cisco relies on customer feedback to guide business decisions; therefore, your valuable input will help shape future Cisco course curricula, products, and training offerings. We would appreciate a few minutes of your time to complete a brief Cisco online course evaluation of your instructor and the course materials in this student kit. On the final day of class, your instructor will provide you with a URL directing you to a short post-course evaluation. If there is no Internet access in the classroom, please complete the evaluation within the next 48 hours or as soon as you can access the web.

On behalf of Cisco, thank you for choosing Cisco Learning Partners for your Internet technology training.

Sincerely,

Cisco Systems Learning

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 4: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 5: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

Table of Contents Volume 1 Course Introduction 1

Overview 1 Learner Skills and Knowledge 1

Course Goal and Objectives 2 Course Flow 4 Additional References 5

Cisco Glossary of Terms 5 Your Training Curriculum 6

Training Curriculum 7 Lifecycle Services Framework 8

The Cisco Lifecycle Services Approach 10 Building a Simple Network 1-1

Overview 1-1 Module Objectives 1-1

Exploring the Functions of Networking 1-3 Overview 1-3

Objectives 1-3 What Is a Network? 1-4 Common Physical Components of a Network 1-6 Interpreting a Network Diagram 1-7 Resource-Sharing Functions and Benefits 1-8 Network User Applications 1-10 Impact of User Applications on the Network 1-12 Characteristics of a Network 1-14 Physical vs. Logical Topologies 1-16

Physical Topologies 1-16 Logical Topologies 1-17

Bus Topology 1-18 Star and Extended-Star Topologies 1-19

Star Topology 1-19 Extended-Star Topology 1-20

Ring Topologies 1-21 Single-Ring Topology 1-21 Dual-Ring Topology 1-22

Mesh and Partial-Mesh Topologies 1-23 Full-Mesh Topology 1-23 Partial-Mesh Topology 1-24

Connection to the Internet 1-25 Summary 1-26

Securing the Network 1-29 Overview 1-29

Objectives 1-29 Need for Network Security 1-30 Balancing Network Security Requirements 1-33 Adversaries, Adversary Motivations, and Classes of Attack 1-35

Classes of Attack 1-36 Mitigating Common Threats 1-37

Physical Installations 1-37 Reconnaissance Attacks 1-38 Access Attacks 1-39 Password Attacks 1-39

Summary 1-41 References 1-42

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 6: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

ii Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

Understanding the Host-to-Host Communications Model 1-43 Overview 1-43

Objectives 1-43 Understanding Host-to-Host Communications 1-44 The OSI Reference Model 1-45 The OSI Model Layers and Their Functions 1-47

Layer 1: The Physical Layer 1-47 Layer 2: The Data Link Layer 1-48 Layer 3: The Network Layer 1-49 Layer 4: The Transport Layer 1-50 Layer 5: The Session Layer 1-51 Layer 6: The Presentation Layer 1-52 Layer 7: The Application Layer 1-53

Encapsulation and De-Encapsulation 1-54 Encapsulation 1-54 Example: Sending a Package through a Postal Service 1-55 De-Encapsulation 1-56 Example: Receiving a Package 1-56

Peer-to-Peer Communication 1-57 TCP/IP Suite 1-58 Summary 1-61

Understanding the TCP/IP Internet Layer 1-63 Overview 1-63

Objectives 1-63 Internet Protocol 1-65

Example: Delivering a Letter through a Postal Service 1-66 IP Addressing 1-67 IP Address Fields 1-68 IP Address Classes 1-70

Class A 1-70 Class B 1-70 Class C 1-71

Reserved IP Addresses 1-72 Network Address 1-72 Directed Broadcast Address 1-72 Local Broadcast Address 1-73 Local Loopback Address 1-73 Autoconfiguration IP Addresses 1-73 Network ID 1-73 Host ID 1-73

Public and Private IP Addresses 1-74 Public IP Addresses 1-74 Private IP Addresses 1-75

Dynamic Host Configuration Protocol (DHCP) 1-76 Domain Name System 1-77 Using Common Host Tools to Determine the IP Address of a Host 1-78 Summary 1-81

Understanding the TCP/IP Transport Layer 1-83 Overview 1-83

Objectives 1-84 Transport Layer Functions 1-85

Example: UDP—Sending Regular Mail 1-85 Example: TCP—Sending Mail “Certified” 1-86 Session Multiplexing 1-86 Segmentation 1-86 Flow Control 1-87 Connection-Oriented Transport Protocol 1-87 Reliability 1-87

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 7: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 iii

Reliable vs. Best-Effort 1-88 Reliable (Connection-Oriented) 1-88 Best-Effort (Connectionless) 1-88

UDP 1-89 Example: Sending Advertising Flyers 1-90

TCP 1-91 Example: Sending Mail Certified 1-92 TCP Header 1-93

TCP/IP Applications 1-94 Mapping Layer 3 to Layer 4 1-95 Mapping Layer 4 to Applications 1-96

UDP-Delivered Applications 1-96 TCP-Delivered Applications 1-97 Well-Known Ports 1-97 Registered Ports 1-97 Dynamically Assigned Ports 1-97

Establishing a Connection with a Peer System 1-98 Three-Way Handshake 1-99

Flow Control 1-100 Acknowledgment 1-100 Windowing 1-101

TCP Acknowledgment 1-102 Windowing 1-104

Fixed Windowing 1-104 Example: Throwing a Ball 1-104 TCP Sliding Windowing 1-106 Maximize Throughput 1-107 Global Synchronization 1-107

TCP Sequence Number and Acknowledgment Numbers 1-108 Summary 1-109

Exploring the Packet Delivery Process 1-111 Overview 1-111

Objectives 1-111 Layer 1 Devices and Their Function 1-112 Layer 2 Devices and Their Function 1-113 Layer 2 Addressing 1-114 Layer 3 Devices and Their Function 1-115 Layer 3 Addressing 1-116 Mapping Layer 2 Addressing to Layer 3 Addressing 1-117 ARP Table 1-118 Host-to-Host Packet Delivery 1-119 Function of the Default Gateway 1-132 Using Common Host Tools to Determine the Path Between Two Hosts Across a Network 1-133 Summary 1-137

Understanding Ethernet 1-139 Overview 1-139

Objectives 1-139 Definition of a LAN 1-140

Examples: A Small Office LAN and an Enterprise LAN 1-140 Components of a LAN 1-141 Functions of a LAN 1-143 How Big Is a LAN? 1-144 Ethernet 1-145 Ethernet LAN Standards 1-146

LLC Sublayer 1-146 MAC Sublayer 1-146

The Role of CSMA/CD in Ethernet 1-147 Ethernet Frames 1-149 Ethernet Frame Addressing 1-151

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 8: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

iv Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

Ethernet Addresses 1-152 MAC Addresses and Binary-Hexadecimal Numbers 1-153 Summary 1-154

Connecting to an Ethernet LAN 1-157 Overview 1-157

Objectives 1-157 Ethernet Network Interface Cards 1-158 Ethernet Media and Connection Requirements 1-159 Connection Media 1-160 UTP Implementation 1-165 Summary 1-171 Module Summary 1-173

References 1-174 Module Self-Check 1-175

Module Self-Check Answer Key 1-186 Ethernet LANs 2-1

Overview 2-1 Module Objectives 2-1

Understanding the Challenges of Shared LANs 2-3 Overview 2-3

Objectives 2-3 Ethernet LAN Segments 2-4 Extending a LAN Segment 2-6 Collisions 2-7 Collision Domains 2-8 Summary 2-9

Solving Network Challenges with Switched LAN Technology 2-11 Overview 2-11

Objectives 2-11 Typical Causes of Network Congestion 2-12 Bridges—Early Solutions to Network Congestion 2-13 Switches 2-14 Switches vs. Bridges 2-16 How Switches Segment the Ethernet Network 2-18 Switching in Action 2-19 LANs Using Switched Technology 2-20 Summary 2-22

Exploring the Packet Delivery Process 2-25 Overview 2-25

Objectives 2-25 Layer 2 Addressing 2-26 Layer 3 Addressing 2-27 Host-to-Host Packet Delivery 2-28 Summary 2-35

Operating Cisco IOS Software 2-37 Overview 2-37

Objectives 2-37 Cisco IOS Software Features and Functions 2-38 Configuring Network Devices 2-39 External Configuration Sources 2-41 Cisco IOS Command-Line Interface Functions 2-43 Entering the EXEC Modes 2-44 Keyboard Help in the CLI 2-46 Enhanced Editing Commands 2-50 Command History 2-53 Summary 2-56

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 9: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 v

Starting a Switch 2-57 Overview 2-57

Objectives 2-57 Physical Startup of the Catalyst Switch 2-58 Switch LED Indicators 2-59 Viewing Initial Bootup Output from the Switch 2-61 Logging In to the Switch 2-65 Configuring a Switch from the Command Line 2-66 Showing the Switch Initial Startup Status 2-71 MAC Address Table Management 2-74 Summary 2-75

Understanding Switch Security 2-77 Overview 2-77

Objectives 2-77 Physical and Environmental Threats 2-78 Configuring Password Security 2-79 Configuring the Login Banner 2-81 Telnet vs. SSH Access 2-82 Port Security Configuration 2-84 Securing Unused Ports 2-88 Summary 2-90

Maximizing the Benefits of Switching 2-91 Overview 2-91

Objectives 2-91 Microsegmentation 2-92

Example: Getting a Dedicated On-Ramp 2-92 Duplex Communication 2-93

Full-Duplex Communication 2-94 Example: Data Conversations 2-94 Duplex Interface Configuration 2-94 Example: Showing Duplex Options 2-95

The Need for Different Media Rates in an Enterprise Network 2-97 Physical Redundancy in an Ethernet LAN 2-98

Example: Loops in a Switched Network 2-99 Loop Resolution with Spanning Tree Protocol 2-100 Summary 2-101

Troubleshooting Switch Issues 2-103 Overview 2-103

Objectives 2-103 Using a Layered Approach 2-104 Identifying and Resolving Media Issues 2-105 Identifying and Resolving Common Access Port Issues 2-110 Identifying and Resolving Common Configuration Issues 2-112 Summary 2-113 Module Summary 2-115 Module Self-Check 2-116

Module Self-Check Answer Key 2-124

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 10: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

vi Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

Wireless LANs 3-1 Overview 3-1

Module Objectives 3-1 Exploring Wireless Networking 3-3

Overview 3-3 Objectives 3-3

The Business Case for WLAN Service 3-4 Differences Between WLANs and LANs 3-5 RF Transmission 3-7 Organizations That Define WLANs 3-8 ITU-R Local FCC Wireless 3-9 802.11 Standards Comparison 3-11 Wi-Fi Certification 3-13 Summary 3-14

Understanding WLAN Security 3-15 Overview 3-15

Objectives 3-15 WLAN Security Threats 3-16 Mitigating Security Threats 3-18 Evolution of WLAN Security 3-19 Wireless Client Association 3-21 How 802.1X Works on WLANs 3-22 WPA and WPA2 Modes 3-23

Enterprise Mode 3-23 Personal Mode 3-23

Summary 3-24 Implementing a WLAN 3-25

Overview 3-25 Objectives 3-25

802.11 Topology Building Blocks 3-26 BSA Wireless Topology 3-28 Wireless Topology Data Rates 3-30 Access Point Configuration 3-31 Steps to Implement a Wireless Network 3-33 Wireless Clients 3-34 Wireless Troubleshooting 3-36 Summary 3-38 Module Summary 3-39 Module Self-Check 3-40

Module Self-Check Answer Key 3-44

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 11: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

ICND1

Course Introduction

Overview “What do I need to know to support my network?” The answer to this question depends on the size and complexity of your network. Fortunately, regardless of the size and complexity of the network, the starting point for leaning to support a network is the same. This course is intended to be that starting point. It focuses on providing the skills and knowledge necessary to implement and support a small switched and routed network.

Learner Skills and Knowledge This subtopic lists the skills and knowledge that learners must possess to benefit fully from the course. The subtopic also includes recommended Cisco learning offerings that learners should first complete to benefit fully from this course.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—3

Learner Skills and Knowledge

Basic computer literacyBasic Windows navigation skillsBasic Internet usage skillsBasic e-mail usage skills

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 12: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

2 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

Course Goal and Objectives This topic describes the course goal and objectives.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—4

Interconnecting Cisco Networking Devices Part 1

“To provide you with the knowledge and skills necessary to install, operate, and troubleshoot a small network”

Course Goal

Upon completing this course, you will be able to meet these objectives:

Describe how networks function, identifying major components, functions of network components, and the OSI reference model

Using the host-to-host packet delivery process, describe issues related to increasing traffic on an Ethernet LAN and identify switched LAN technology solutions to Ethernet networking issues

Describe the reasons for extending the reach of a LAN, and the methods that can be used, with a focus on RF wireless access

Describe the reasons for connecting networks with routers, and how routed networks transmit data through using TCP/IP

Describe the function of WANs and the major devices of WANs, and configure PPP encapsulation, static and dynamic routing, and PAT and RIP routing

Use the CLI to discover neighbors on the network and manage router startup and configuration

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 13: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Course Introduction 3

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—5

General Administration

Class-RelatedSign-in sheetLength and timesBreak and lunch room locationsAttire

Facilities-RelatedCourse materialsSite emergency proceduresRest roomsTelephones and faxes

The instructor will discuss these administrative issues so that you know exactly what to expect from the class:

Sign-in process

Starting and anticipated ending times of each class day

Class break and lunch facilities

Appropriate attire during class

Materials you can expect to receive during class

What to do in the event of an emergency

Location of the rest rooms

How to send and receive telephone and fax messages

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 14: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

4 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

Course Flow This topic presents the suggested flow of the course materials.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—6

Course Flow

Module 1Building a

Simple Network

CourseIntroduction

AM

PM

Day 1 Day 2 Day 3 Day 4 Day 5

Module 1Building a

Simple Network

Module 2Ethernet

LANs

Module 5WAN

Connections

Capstone Lab

Module 6Network

EnvironmentManagement

LunchModule 2Ethernet LANs

Module 3Wireless

LANs

Module 4LAN

Connections

Module 4LAN

Connections

Module 5WAN

Connections

The schedule reflects the recommended structure for this course. This structure allows enough time for the instructor to present the course information and for you to work through the lab activities. The exact timing of the subject materials and labs depends on the pace of your specific class.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 15: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Course Introduction 5

Additional References This topic presents the Cisco icons and symbols that are used in this course, as well as information on where to find additional technical references.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—7

Cisco Icons and Symbols

Workgroup Switch

Router

Access Point

WirelessRouter

WirelessConnectivity

Line: Serial Line: Ethernet

Home Office

SmallBusiness

Firewall

IP Phone Mobile Access Phone

Secure Router

Cisco Glossary of Terms For additional information on Cisco terminology, refer to the Cisco Internetworking Terms and Acronyms glossary of terms at http://www.cisco.com/univercd/cc/td/doc/cisintwk/ita/index.htm.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 16: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

6 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

Your Training Curriculum This topic presents the training curriculum for this course.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—8

www.cisco.com/go/certifications

Cisco Certifications

Cisco Career Certifications

You are encouraged to join the Cisco Certification Community, a discussion forum open to anyone holding a valid Cisco Career Certification (such as Cisco CCIE®, CCNA®, CCDA®, CCNP®, CCDP®, CCIP®, CCVP™, or CCSP™). It provides a gathering place for Cisco certified professionals to share questions, suggestions, and information about Cisco Career Certification programs and other certification-related topics. For more information, visit http://www.cisco.com/go/certifications.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 17: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Course Introduction 7

Training Curriculum This subtopic presents the training curriculum for this course.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—9

CCIE

CCNP

CCNA CCENT

Expert

Expand Your Professional Options, Advance Your Career

Entry Technician

Recommended Training Through Cisco Learning Partners

Interconnecting Cisco Networking Devices Part 1

Interconnecting Cisco Networking Devices Part 2

Cisco Certified Network Associate

Recommended Training Through Cisco Learning Partners

Interconnecting Cisco Networking Devices Part 1

Cisco Certified Entry Network Technician

Professional

Associate

www.cisco.com/go/certifications

Cisco Career Certifications

For more information on certifications, visit http://www.cisco.com/go/certifications.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—10

CCNA Prep Center

www.cisco.com/go/prepcenter

Additional information is available at http://www.cisco.com/go/prepcenter.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 18: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

8 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

Lifecycle Services Framework This figure provides a high-level introduction to the concept of a network lifecycle and the Cisco Lifecycle Services approach. The whole chain of events needs to be coordinated for deployed technologies to be successful. These events are sequential, interconnected, and interdependent.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—11

What Is the Lifecycle Services Framework?

• The Cisco Lifecycle Services Framework defines the minimum set of activities needed to deploy, operate, and optimize Cisco technologies successfully throughout the lifecycle of a network.

• There are six phases in the network lifecycle: Prepare, Plan, Design, Implement, Operate and Optimize.• Each phase has a set of service components comprising activities and deliverables to help ensure

service excellence. A network service is performed when a service component item is completed.

These are the phases of the Cisco Lifecycle Services:

Prepare: Make sound financial decisions.

— Establish the financial justification through a business case.

— Reduce later rework by developing a high-level, conceptual architecture.

Plan: Set the stage for smooth, on-time deployment.

— Assess your network and sites.

— Develop a project management plan.

Design: Reduce risk and rework and speed successful implementation.

— Develop a comprehensive, detailed design that meets business and technical requirements.

Implement: Speed return on investment.

— Integrate devices without disrupting the existing network or creating points of vulnerability.

Operate: Maintain high availability and reduce expenses.

— Maintain network health through day-to-day operations.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 19: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Course Introduction 9

Optimize: Improve performance, availability, capacity, and security.

— Achieve operational excellence through ongoing improvement of system performance and functionality.

Network security has historically been approached as a collection of products used primarily to secure the network perimeter or site-to-site connectivity. Today, finding and fixing individual network security holes and point problems are not enough, because the cost of security breaches or disruptions is high and can take many forms—network downtime, theft of proprietary information, loss of revenue, diminished goodwill, and so on.

The approach to a security solution now is different:

Security now requires a system-level approach to securing the entire network—the perimeter, data centers, campus LAN, wireless LAN (WLAN), desktops, and endpoint hosts.

Securing the network is an ongoing process that enables the corporation to help ensure the efficient and effective pursuit of corporate missions and goals.

Every organization needs a comprehensive network security process that aligns business goals with network capabilities and technical requirements.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 20: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

10 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—12

CCNA Students:A Focus on “Implement” and “Operate”

Achieve operational excellence by adapting the architecture, operation, and performance of the network to ever-changing business requirements and positioning it to reenter the prepare phase of its lifecycle.

Optimize

Maintain network health through day-to-day operations.Operate

Integrate the new solution without disrupting the network or creating points of vulnerability.Implement

Design a solution that meets business and technical requirements.Design

Assess the existing environment to determine whether it can support the proposed system sufficiently and securely.Plan

Make sound financial decisions by developing a business case that establishes the financial justification for making a technology change.Prepare

Benefits of the Lifecycle Services ApproachPhase

The Cisco Lifecycle Services Approach The Cisco Lifecycle Services approach defines the minimum set of activities needed, by technology and network complexity, to help you successfully deploy and operate Cisco technologies and optimize their performance throughout the lifecycle of your network. The network lifecycle is a beginning-to-end view of the continuum of events that take place in the network lifespan.

The Cisco Lifecycle Services approach establishes methodologies that are based on leading practices commonly agreed on and understood in the networking industry and aligns service and support activities with business and technology requirements throughout the network lifecycle.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 21: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Course Introduction 11

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—13

A Network Lifecycle Services Approach:Why Is It Important Now?

In the past, point approaches for the Design, Implement, and Operate phases were sufficient to deploy and support a network.Today, network complexity and technology convergence increase the importance of having a networklifecycle approach that adapts over time to changing business conditions. A coordinated and continualsequence of lifecycle service activities leads to successful initial implementations and operations as wellas to future optimized performance.The Cisco Lifecycle Services approach helps meet these new and more complex requirements.

In the past, point approaches for the Design, Implement, and Operate phases were sufficient to deploy and support a network.

Today, network complexity and technology convergence increase the importance of having a network lifecycle approach that adapts over time to changing business conditions. A coordinated and continual sequence of lifecycle service activities leads to successful initial implementations and operations as well as to future optimized performance.

The Cisco Lifecycle Services approach helps meet these new and more complex requirements.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 22: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

12 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—14

Learner Introductions

Your nameYour companyJob responsibilitiesSkills and knowledgeBrief historyObjective

Prepare to share this information:

Your name

Your company

Your job responsibilities

The prerequisite skills that you have

A profile of your experience

What you would like to learn from this course

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 23: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

Module 1

Building a Simple Network

Overview To understand how networks function, it is important to gain a basic understanding of the major components of networks. This module explains the major components of networks by introducing fundamental computer and network components and the characteristics, functions, benefits, metrics, and attributes used to characterize features and performance. This module also introduces the Open Systems Interconnection (OSI) reference model and data communications terms and concepts. Finally, this module introduces using an Ethernet LAN to create a host network.

Module Objectives Upon completing this module, you will be able to create a simple host-to-host network and describe network components and functions. This ability includes being able to meet these objectives:

Identify the benefits of computer networks and how they function

Identify common threats to a network and threat-mitigation methods

Identify and compare the communication models that control host-to-host communications

Describe IP address classification and how a host can obtain an address

Describe the process that TCP uses to establish a reliable connection

Describe the host-to-host packet-delivery process

Describe how Ethernet operates at Layer 1 and Layer 2 of the OSI model

Identify methods of connecting to an Ethernet LAN

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 24: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

1-2 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 25: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

Lesson 1

Exploring the Functions of Networking

Overview Understanding the benefits of computer networks and how they function is important in maximizing communication channels between end users. This lesson describes the concept of computer networking, introduces the components of a computer network, and explains how a network benefits users.

Objectives Upon completing this lesson, you will be able to list the common components, purposes, and functions of a network. This ability includes being able to meet these objectives:

Define a network

List the common components of a network

Interpret network diagrams

List major resource-sharing functions of networks and their benefits

List four common user applications that require network access and the benefits of each

Describe the impact of user applications on the network

List the categories of characteristics used to describe the various network types

Compare and contrast physical and logical topologies

List the characteristics of a bus topology

List the characteristics of a star and extended-star topology

List the characteristics of a ring and dual-ring topology

List the characteristics of a mesh and partial-mesh topology

Describe the methods of connecting to the Internet

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 26: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

1-4 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

What Is a Network? This topic describes the characteristics and environments of different network types and provides examples of networks.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-2

What Is a Network?

A network is a connected collection of devices and end systems, such as computers and servers, which can communicate with each other. Networks carry data in many types of environments, including homes, small businesses, and large enterprises. In a large enterprise, there may be a number of locations that need to communicate with each other, and you can describe those locations in terms of where the workers are located, as follows:

Main office: A main office is a site where everyone is connected via a network and where the bulk of corporate information is located. A main office can have hundreds or even thousands of people who depend on network access to do their jobs. A main office may use several connected networks, which can span many floors in an office building or cover a campus that contains several buildings.

Remote locations: A variety of remote access locations use networks to connect to the main office or to each other.

— Branch offices: In branch offices, smaller groups of people work and communicate with each other via a network. Although some corporate information may be stored at a branch office, it is more likely that branch offices have local network resources, such as printers, but must access information directly from the main office.

— Home offices: When individuals work from home, the location is called a home office. Home office workers often require on-demand connections to the main or branch offices to access information or use network resources such as file servers.

— Mobile users: Mobile users connect to the main office network while at the main office, at the branch office, or traveling. The network access needs of mobile users are based on where the mobile users are located.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 27: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Building a Simple Network 1-5

You may use a network in your home office to communicate via the Internet to locate information, place orders for merchandise, and send messages to friends. Or you may have a small office that is set up with a network that connects other computers and printers in the office. Or you may work in a large enterprise in which there are many computers, printers, storage devices, and servers that are used to communicate and store information from many departments over large geographic areas.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 28: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

1-6 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

Common Physical Components of a Network This topic describes the typical physical components of a network, including PCs, interconnections, switches, and routers.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-3

Common Physical Components of a Network

These are the four major categories of physical components in a computer network:

Personal computers (PCs): The computers serve as end points in the network, sending and receiving data.

Interconnections: The interconnections consist of components that provide a means for data to travel from one point to another point in the network. This category includes components such as the following:

— Network interface cards (NICs) that translate the data produced by the computer into a format that can be transmitted over the local network

— Network media, such as cables or wireless media, that provide the means by which the signals are transmitted from one networked device to another

— Connectors that provide the connection points for the media

Switches: Switches are devices that provide network attachment to the end systems and intelligent switching of the data within the local network.

Routers: Routers interconnect networks and choose the best paths between networks.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 29: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Building a Simple Network 1-7

Interpreting a Network Diagram This topic describes the typical icons used to represent the components of a network, including such items as PCs, switches, and routers.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-4

Interpreting a Network Diagram

The network diagram is used to capture information related to the network. The amount of information and the detail differs from organization to organization. The network topology is commonly represented by a series of lines and icons. In this diagram:

A is used to represent the Internet.

A is used to represent a router.

A is used to represent a workgroup switch.

A is used to represent a server.

A is used to represent an end user PC.

A is used to represent an Ethernet link.

A is used to represent a serial link.

Other information may be included as space allows. For example, it is common to identify the interface on a device in the format of s0/0/0 for a serial interface or fa0/0 for a Fast Ethernet interface. It is also common to include the network address of the segment in the format such as 10.1.1.0/24 where 10.1.1.0 indicates the network address and /24 indicates the subnet mask.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 30: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

1-8 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

Resource-Sharing Functions and Benefits This topic describes the major resource-sharing functions of a computer network and how each function benefits end users.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-5

Resource-Sharing Functions and Benefits

Data and applicationsResourcesNetwork storageBackup devices

Networks allow end users to share both information and hardware resources. The major resources that are shared in a computer network include the following:

Data and applications: When users are connected through a network, they can share files and even software application programs, making data more easily available and promoting more efficient collaboration on work projects.

Resources: The resources that can be shared include both input devices, such as cameras, and output devices, such as printers.

Network storage: Today there are several ways in which the network makes storage available to users. Direct attached storage (DAS) directly connects physical storage to a PC or a shared server. Network attached storage (NAS) makes storage available through a special network appliance. Finally, storage area networks (SANs) provide a network of storage devices.

Backup devices: A network can also include backup devices, such as tape drives, that provide a central means to save files from multiple computers. Network storage is also used to provide archive capability, business continuance, and disaster recovery.

The overall benefit to users who are connected by a network is an efficiency of operation through commonly available components that are used in everyday tasks—sharing files, printing, and storing data. This efficiency results in reduced expenditures and increased productivity.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 31: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Building a Simple Network 1-9

In recent years, the openness that was once pervasive in networking has been replaced with a need for caution. There have been many well-advertised acts of “cybervandalism,” in which both end systems and network devices have been broken into; therefore, the need for network security has to be balanced with the need for connectivity.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 32: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

1-10 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

Network User Applications While there are many applications available for users in a network environment, some applications are common to nearly all users. This topic describes common network user applications.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-6

Network User Applications

E-mail (Outlook, POP3, Yahoo, and so on)Web browser (IE, Firefox, and so on)Instant messaging (Yahoo IM, Microsoft Messenger, and so on) Collaboration (Whiteboard, Netmeeting, WebEx, and so on)Databases (file servers)

The most common network user applications include the following:

E-mail: E-mail is a very valuable application for most network users. Users can communicate information (messages and files) electronically in a timely manner, to not only other users in the same network but also other users outside the network (suppliers, information resources, and customers, for example). Examples of e-mail programs include Microsoft Outlook and Eudora by Qualcomm.

Web browser: A web browser allows access to the Internet through a common interface. The Internet provides a wealth of information and has become vital to the productivity of both home and business users. A web browser allows a common interface for communicating with suppliers and customers, handling orders and fulfillment, and locating information are now routinely done electronically over the Internet, which saves time and increases overall productivity. The most commonly used browsers are Microsoft Internet Explorer, Netscape Navigator, Mozilla, and Firefox.

Instant messaging: Instant messaging started in the personal user-to-user space; however, it soon provided considerable benefit in the corporate world. There are now many instant messaging applications, such as those provided by AOL and Yahoo, that provide data encryption and logging—features essential for corporate use.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 33: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Building a Simple Network 1-11

Collaboration: Working together as individuals or groups is greatly facilitated when the collaborators are on a network. Individuals creating separate parts of an annual report or a business plan, for example, can either transmit their data files to a central resource for compilation or use a workgroup software application to create and modify the entire document, without any exchange of paper. One of the best-known collaboration software programs is Lotus Notes.

Database: This type of application allows users on a network to store information in central locations (such as file servers) so that others on the network can easily retrieve selected information in the formats that are most useful to them.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 34: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

1-12 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

Impact of User Applications on the Network Applications can affect network performance and network performance can affect applications. This topic describes common interactions between user applications and the network.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-7

Impact of User Applications on the Network

Batch applications – FTP, TFTP, inventory updates– No direct human interaction– Bandwidth important, but not critical

Interactive applications– Inventory inquiries, database updates.– Human-to-machine interaction.– Because a human is waiting for a

response, response time is important but not critical, unless the wait becomes excessive.

Real-time applications– VoIP, video– Human-to-human interaction– End-to-end latency critical

When considering the interaction between the network and applications that ran on the network, bandwidth was historically the main concern. Batch applications such as FTP, TFTP, and inventory updates would be initiated by a user, then run to completion by the software with no further direct human interaction. Because of this, bandwidth was important but not critical, as long as the time it took the application to complete does not become excessive. Interactive applications such as inventory inquiries and database updates required more human interaction: The user would request some type of information from the server, then wait for a reply. Bandwidth became more important as users became impatient with slow responses. However, since response time was more dependent on the server than on the network, bandwidth was still not critical. In most cases quality of service (QoS) features could overcome bandwidth limitations by giving interactive applications preference over batch applications.

Like interactive applications, real time applications such as VoIP and video applications involve human interaction. Because of the amount of information that is transmitted, bandwidth has become critical. In addition, because these applications are time-critical, latency (delay through the network) has become critical. Even variations in the amount of latency can affect the network. Not only is proper bandwidth mandatory, QoS is mandatory. VoIP and video applications must be given the highest priority.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 35: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Building a Simple Network 1-13

In today’s environment, the end user is bombarded with ads indicating how much money can be saved by converting to VoIP and suggesting that installation is as easy as dropping a VoIP router into the network. While this is often true in the home network, it can result in disaster in a small office network. Simply installing a VoIP router in a network does not provide enough bandwidth to the Internet, nor does it provide a proper QoS scheme. The result is that applications that used to work start to run so slowly that they are unusable when someone is on the phone, and voice quality is poor. Both issues can be overcome with proper network design.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 36: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

1-14 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

Characteristics of a Network This topic describes a set of characteristics that is commonly used to describe and compare various network types.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-8

Characteristics of a Network

SpeedCostSecurityAvailabilityScalabilityReliabilityTopology

Networks can be described and compared according to network performance and structure, as follows:

Speed: Speed is a measure of how fast data is transmitted over the network. A more precise term would be data rate.

Cost: Cost indicates the general cost of components, installation, and maintenance of the network.

Security: Security indicates how secure the network is, including the data that is transmitted over the network. The subject of security is important and constantly evolving. You should consider security whenever you take actions that affect the network.

Availability: Availability is a measure of the probability that the network will be available for use when it is required. For networks that are meant to be used 24 hours a day, 7 days a week, 365 days a year, availability is calculated by dividing the time it is actually available by the total time in a year and then multiplying by 100 to get a percentage.

For example, if a network is unavailable for 15 minutes a year because of network outages, its percentage availability can be calculated as follows:

([Number of minutes in a year – downtime] / [Number of minutes in a year]) * 100 = Percentage availability

([525600 – 15] / [525600]) * 100 = 99.9971

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 37: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Building a Simple Network 1-15

Scalability: Scalability indicates how well the network can accommodate more users and data transmission requirements. If a network is designed and optimized for just the current requirements, it can be very expensive and difficult to meet new needs when the network grows.

Reliability: Reliability indicates the dependability of the components (routers, switches, PCs, and so on) that make up the network. This is often measured as a probability of failure, or mean time between failures (MTBF).

Topology: In networks, there are two types of topologies: the physical topology, which is the arrangement of the cable, network devices, and end systems (PCs and servers), and the logical topology, which is the path that the data signals take through the physical topology.

These characteristics and attributes will provide a means to compare different networking solutions.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 38: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

1-16 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

Physical vs. Logical Topologies This topic describes the physical and logical topologies of networks, including the layout of the cabling and devices and the paths used in data transmissions.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-9

Physical Topology Categories

Each type of network has both a physical and a logical topology.

Physical Topologies The physical topology of a network refers to the physical layout of the devices and cabling. You must match the appropriate physical topology to the type of cabling (twisted pair, coaxial, fiber, and so on) that will be installed. Therefore, understanding the type of cabling used is important in understanding each type of physical topology. Here are the three primary categories of physical topologies:

Bus: In early bus topologies, computers and other network devices were cabled together in a line using coaxial cable. Modern bus topologies establish the bus in a hardware device and connect the host devices to the bus using twisted-pair wiring.

Ring: Computers and other network devices are cabled together, with the last device connected to the first to form a circle, or ring. This category includes both ring and dual-ring topologies. The physical connection can be made using either coaxial or fiber.

Star: A central cabling device connects the computers and other network devices. This category includes both star and extended-star topologies. The physical connection is commonly made using twisted-pair wiring.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 39: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Building a Simple Network 1-17

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-10

Logical Topologies

Logical Topologies The logical topology of a network refers to the logical paths that the signals use to travel from one point on the network to another; that is, the way in which data accesses the network media and transmits packets across it.

The physical and logical topologies of a network can be the same. For example, in a network physically shaped as a linear bus, the data travels along the length of the cable. Therefore, the network has both a physical bus topology and a logical bus topology.

On the other hand, a network can have physical and logical topologies that are quite different. For example, a physical topology in the shape of a star, in which cable segments connect all computers to a central hub, can have a logical ring topology. Remember that in a ring, the data travels from one computer to the next, and inside the hub, the wiring connections are such that the signal actually travels around in a circle from one port to the next, creating a logical ring. Therefore, it is not always possible to predict how data travels in a network simply by observing its physical layout.

Star topology is by far the most common implementation of LANs today. Ethernet uses a logical bus topology in either a physical bus or a physical star. An Ethernet hub is an example of a physical star topology with a logical bus topology.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 40: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

1-18 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

Bus Topology Commonly referred to as a linear bus, all of the devices on a bus topology are effectively connected by one single cable. This topic describes a bus topology.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-11

Bus Topology

All devices receive the signal.

As illustrated in the figure, in a bus topology a cable proceeds from one computer to the next like a bus line going through a city. The main cable segment must end with a terminator that absorbs the signal when it reaches the end of the line or wire. If there is no terminator, the electrical signal representing the data bounces back at the end of the wire, causing errors in the network.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 41: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Building a Simple Network 1-19

Star and Extended-Star Topologies The star topology is the most common physical topology in Ethernet LANs. This topic describes both the star and extended-star topologies.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-12

Star Topology

Transmission through a central point.Single point of failure.

When installed, the star topology resembles spokes in a bicycle wheel. It is made up of a central connection point that is a device, such as a hub, switch, or router, where all the cabling segments actually meet. Each device on the network is connected to the central device with its own cable.

Star Topology Although a physical star topology costs more to implement than the physical bus topology, the advantages of a star topology make it worth the additional cost. Each device is connected to the central device with its own wire, so that if that cable has a problem, only that one device is affected, and the rest of the network remains operational. This benefit is extremely important and is the reason why almost every newly designed Ethernet LAN has a physical star topology.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 42: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

1-20 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-13

Extended-Star Topology

More resilient than star topology.

Extended-Star Topology When a star network is expanded to include an additional network device that is connected to the main network devices, the topology is referred to as an extended-star topology.

The problem with the pure extended-star topology is that if the central node point fails, large portions of the network can become isolated.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 43: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Building a Simple Network 1-21

Ring Topologies As the name implies, in a ring topology all the devices on a network are connected in the form of a ring or circle. This topic describes a ring topology.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-14

Ring Topology

Signals travel around ring.Single point of failure.

Unlike the physical bus topology, a ring type of topology has no beginning or end that needs to be terminated. Data is transmitted in a way that is very different from the logical bus topology. In one implementation, a “token” travels around the ring, stopping at each device. If a device wants to transmit data, it adds that data and the destination address to the token. The token then continues around the ring until it finds the destination device, which takes the data out of the token. The advantage of using this type of method is that there are no collisions of data packets. There are two types of ring topology: single-ring and dual-ring.

Single-Ring Topology In a single-ring topology, all the devices on the network share a single cable, and the data travels in one direction only. Each device waits its turn to send data over the network. The single ring, however, is susceptible to a single failure, stopping the entire ring from functioning.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 44: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

1-22 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-15

Dual-Ring Topology

Signals travel in opposite directions.More resilient than single ring.

Dual-Ring Topology In a dual-ring topology, two rings allow data to be sent in both directions. This setup creates redundancy (fault tolerance), meaning that if one ring fails, data can be transmitted on the other ring.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 45: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Building a Simple Network 1-23

Mesh and Partial-Mesh Topologies Another type of topology that is similar to the star topology is mesh topology. This topic describes mesh and partial-mesh topologies.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-16

Full-Mesh Topology

Highly fault-tolerantExpensive to implement

Full-Mesh Topology The full-mesh topology connects all devices (or nodes) to one another for redundancy and fault tolerance. Implementing a full-mesh topology is expensive and difficult. This method is the most resistant to failures, because any single link failing will not affect reach ability.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 46: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

1-24 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-17

Partial-Mesh Topology

Trade-off between fault tolerance and cost

Partial-Mesh Topology In a partial-mesh topology, at least one device maintains multiple connections to all other devices, without being fully meshed. This method trades off the cost of meshing all devices by allowing the network designer to choose which nodes are the most critical and appropriately interconnect them.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 47: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Building a Simple Network 1-25

Connection to the Internet This topic describes common methods of connecting to the Internet.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-18

Connection to the Internet

There are three common methods of connecting the small office to the Internet. DSL uses the existing telephone lines. Cable uses the cable television (CATV) infrastructure. Serial links uses the classic digital local loops. In the case of DSL and cable, the incoming lines are terminated into a modem that converts the incoming digital encoding into Ethernet format. In the case of serial, this is done by CSU/DSU. In all three cases (DSL, cable, and serial) the Ethernet output is sent to a router that is part of the customer premises equipment (CPE).

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 48: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

1-26 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

Summary This topic summarizes the key points that were discussed in this lesson.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-19

SummaryA network is a connected collection of devices that can communicate with each other. Networks carry data in many kinds of environments, including homes, small businesses, and large enterprises. There are four major categories of physical components in a computer network: the computer, interconnections, switches, and routers. Networks are depicted graphically using a set of standard icons.The major resources that are shared in a computer network include data and applications, peripherals, storage devices, andbackup devices. The most common network user applications include e-mail, web browsers, instant messaging, collaboration, and databases.User applications affect the network by consuming network resources.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-20

The ways in which networks can be described include characteristics that address network performance and structure:speed, cost, security, availability, scalability, reliability, andtopology.A physical topology describes the layout for wiring the physicaldevices, while a logical topology describes how information flows through a network.In a physical bus topology, a single cable effectively connects all the devices.In a physical star topology, each device in the network is connected to the central device with its own cable.When a star network is expanded to include additional networkingdevices that are connected to the main networking device, it is called an extended-star topology.

Summary (Cont.)

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 49: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Building a Simple Network 1-27

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-21

Summary (Cont.)

In a ring topology, all the hosts are connected in the form of a ring or circle. In a dual-ring topology, there are two rings to provide redundancy in the network.A full-mesh topology connects all devices to each other; in a partial-mesh topology, at least one device has multiple connections to all other devices.There are three common methods of connecting the small office to the Internet: DSL using the existing telephone lines, cable using the CATV infrastructure, and serial links using the classic digital local loops.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 50: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

1-28 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 51: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

Lesson 2

Securing the Network

Overview How important is it to have a strong network security policy? In 2005, Computer Security Institute (CSI) produced a report for the 2005 Computer Crime and Security Survey that provided an updated look at the impact of computer crime in the United States. One of the major participants was the San Francisco Federal Bureau of Investigation (FBI) Computer Intrusion Squad. Based on responses from over 700 computer security practitioners in U.S. corporations, government agencies, financial institutions, medical institutions, and universities, the survey confirms that the threat from computer crime and other information security breaches continues unabated and that the financial toll is mounting.

The application of an effective security policy is the most important step that an organization must take to protect itself. An effective security policy is the foundation for all of the activities undertaken to secure network resources.

Objectives Upon completing this lesson, you will be able to explain the need for a comprehensive network security policy. This ability includes being able to meet these objectives:

Explain how sophisticated attack tools and open networks have generated an increased need for network security and dynamic security policies

Describe the challenge of balancing network security needs against e-business processes, legal issues, and government policies

Describe network adversaries, hacker motivations, and classes of attack

Describe how to mitigate common threats to Cisco routers and switches

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 52: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

1-30 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

Need for Network Security This topic explains how sophisticated attack tools and open networks have generated an increased need for network security and dynamic security policies.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-2

Closed Networks

Attacks from inside the network remain a threat.

The easiest way to protect a network from an outside attack is to close it off completely from the outside world. A closed network provides connectivity only to trusted known parties and sites; a closed network does not allow a connection to public networks.

Because there is no outside connectivity, networks designed in this way can be considered safe from outside attacks. However, internal threats still exist. The CSI in San Francisco, California, estimates that 60 to 80 percent of network misuse comes from inside the enterprise where misuse has taken place.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 53: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Building a Simple Network 1-31

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-3

Open Networks

Today, corporate networks require access to the Internet and other public networks. It is not uncommon for corporate networks have several access points to public and other private networks. Securing open networks is extremely important.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 54: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

1-32 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-4

Threat Capabilities—More Dangerous and Easier to Use

The figure illustrates how the increasing sophistication of hacking tools and the decreasing skill needed to use these tools have combined to pose increasing threats to open networks. With the development of large open networks, security threats have increased significantly in the past 20 years. Hackers have discovered more network vulnerabilities, and hacking tools have become easier to use. You can now download applications that require little or no hacking knowledge to implement. Applications intended for troubleshooting and maintaining and optimizing networks can, in the wrong hands, be used maliciously and pose severe threats.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 55: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Building a Simple Network 1-33

Balancing Network Security Requirements This topic describes the challenge of balancing network security needs against e-business needs, legal issues, and government policies.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-5

E-Business Challenge

The overall security challenge is to find a balance between two important needs: open networks to support evolving business requirements and freedom-of-information initiatives, versus protection of private, personal, and strategic business information.

Security has moved to the forefront of network management and implementation. For the survival of many businesses, it is necessary to allow open access to network resources and to ensure that data and resources are as secure as possible. The increasing importance of e-business and the need for private data to traverse potentially unsafe public networks increases the need for the development and implementation of a corporate-wide network security policy. Establishing a network security policy should be the first step in changing a network over to a secure infrastructure.

The Internet has created expectations for a company to build stronger relationships with customers, suppliers, partners, and employees. E-business challenges companies to become more agile and competitive. The benefit of this challenge is that new applications for e-commerce, supply chain management, customer care, workforce optimization, and e-learning have been created. These applications streamline and improve processes, lowering costs while increasing turnaround times and user satisfaction.

As enterprise network managers open their networks to more users and applications, they also expose the networks to greater risk. The result has been an increase in business security requirements. Security must be included as a fundamental component of any e-business strategy.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 56: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

1-34 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

E-business requires mission-critical networks that can accommodate ever-increasing constituencies and ever-increasing demands on capacity and performance. These networks also need to handle voice, video, and data traffic as networks converge into multi-service environments.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 57: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Building a Simple Network 1-35

Adversaries, Adversary Motivations, and Classes of Attack

This topic describes network adversaries, the motivations of adversaries, and classes of attack.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-6

Adversaries, Adversary Motivations, and Classes of Attack

PassiveActiveClose-inInsiderDistributed

IntelligenceTheft DoSEmbarrassmentChallenge

Nation-statesTerroristsCriminalsHackersCrackersCompetitors“Script kiddies”Disgruntled employeesGovernment

Classes of AttackMotivationsAdversaries

To defend against attacks on information and information systems, organizations must define the threat in these three terms:

Adversaries: Until the 1980s, all people with a high level of skills in computing were known as “hackers.” Over time, the distinction between those perceived as using such skills responsibly and those perceived as using them maliciously or criminally became an important divide. Many members of the first group argue that those in the second group should be called “crackers” rather than hackers, but the common usage has become ingrained. The former have become known within the computer security industry as “white hats” and the latter as “black hats.” Less experienced malicious crackers are often called “script kiddies.” Other potential adversaries might include nation-states, terrorists, criminals, disgruntled employees, and corporate competitors.

Adversary motivations: The motivations of adversaries may include intelligence gathering, theft of intellectual property, denial of service (DoS), embarrassment of the company or clients, or the challenge of exploiting a notable target.

Classes of attack: Classes of attack may include passive monitoring of communications, active network attacks, close-in attacks, exploits by insiders, and distributed attacks through remote access.

Information systems and networks offer attractive targets and should be resistant to attack from the full range of threat agents, from hackers to nation-states. A system must be able to limit 9damage and recover rapidly when attacks occur.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 58: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

1-36 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

Classes of Attack There are five classes of attack:

Passive: Passive attacks include traffic analysis, monitoring of unprotected communications, decrypting weakly encrypted traffic, and capturing authentication information such as passwords. Passive interception of network operations lets adversaries see upcoming actions. Passive attacks result in the disclosure of information or data files to an attacker without the consent or knowledge of the user. Examples include the disclosure of personal information such as credit card numbers and medical files.

Active: Active attacks include attempts to circumvent or break protection features, introduce malicious code, and steal or modify information. These attacks are mounted against a network backbone, exploit information in transit, electronically penetrate an enclave, or attack an authorized remote user during an attempt to connect to an enclave. Active attacks result in the disclosure or dissemination of data files, DoS, or modification of data.

Close-in: Close-in attacks consist of regular individuals attaining close physical proximity to networks, systems, or facilities for the purpose of modifying, gathering, or denying access to information. Close physical proximity is achieved through surreptitious entry to the network, open access, or both.

Insider: Insider attacks can be malicious or nonmalicious. Malicious insiders intentionally eavesdrop, steal or damage information, use information in a fraudulent manner, or deny access to other authorized users. Nonmalicious attacks typically result from carelessness, lack of knowledge, or intentional circumvention of security for such reasons as performing a task.

Distributed: Distributed attacks focus on the malicious modification of hardware or software at the factory or during distribution. These attacks introduce malicious code such as a back door to a product to gain unauthorized access to information or to a system function at a later date.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 59: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Building a Simple Network 1-37

Mitigating Common Threats Improper and incomplete network device installation is an often-overlooked security threat that, if left unheeded, can have dire results. Software-based security measures alone cannot prevent premeditated or even accidental network damage due to poor installation. This topic describes how to mitigate common security threats to Cisco routers and switches.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-7

Common ThreatsPhysical installations – Hardware threats– Environmental threats– Electrical threats– Maintenance threats

Reconnaissance attacks—Learning information about a target network by using readily available information and applicationsAccess attacks—Attacks on networks or systems for these reasons:– Retrieve data– Gain access– Escalate their access privileges

Password attacks—Tools used by hackers to compromise passwords

Physical Installations The following are physical threats:

Hardware threats: The threat of physical damage to the router or switch hardware. Mission-critical Cisco network equipment should be located in wiring closets or in computer or telecommunications rooms that meet these minimum requirements:

— The room must be locked with only authorized personnel allowed access.

— The room should not be accessible via a dropped ceiling, raised floor, window, ductwork, or point of entry other than the secured access point.

— If possible, use electronic access control with all entry attempts logged by security systems and monitored by security personnel.

— If possible, security personnel should monitor activity via security cameras with automatic recording.

Environmental threats: Threats such as temperature extremes (too hot or too cold) or humidity extremes (too wet or too dry). Take these actions to limit environmental damage to Cisco network devices:

— Supply the room with dependable temperature and humidity control systems. Always verify the recommended environmental parameters of the Cisco network equipment with the supplied product documentation.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 60: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

1-38 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

— Remove any sources of electrostatic and magnetic interference in the room.

— If possible, remotely monitor and alarm the environmental parameters of the room.

Electrical threats: Threats such as voltage spikes, insufficient supply voltage (brownouts), unconditioned power (noise), and total power loss. Electrical supply problems can be limited by adhering to these guidelines:

— Install uninterruptible power supply (UPS) systems for mission-critical Cisco network devices.

— Install backup generator systems for mission-critical supplies.

— Plan for and initiate regular UPS or generator testing and maintenance procedures based on the manufacturer-suggested preventative maintenance schedule.

— Install redundant power supplies on critical devices.

— Monitor and alarm power-related parameters at the power supply and device levels.

Maintenance threats: Maintenance threats include poor handling of key electronic components (ESD), lack of critical spares, poor cabling, poor labeling, and so on. Maintenance-related threats compose a broad category that includes many items. Follow the general rules listed here to prevent maintenance-related threats.

— Clearly label all equipment cabling and secure the cabling to equipment racks to prevent accidental damage, disconnection, or incorrect termination.

— Use cable runs, raceways, or both, to traverse rack-to-ceiling or rack-to-rack connections.

— Always follow ESD procedures when replacing or working with internal router and switch device components.

— Maintain a stock of critical spares for emergency use.

— Do not leave a console connected to and logged into any console port. Always log off administrative interfaces when leaving a station.

— Do not rely upon a locked room as the only necessary protection for a device. Always remember that no room is ever totally secure. After intruders are inside a secure room, there is nothing to stop them from connecting a terminal to the console port of a Cisco router or switch.

Reconnaissance Attacks Reconnaissance is the unauthorized discovery and mapping of systems, services, or vulnerabilities. Reconnaissance is also known as information gathering and, in most cases, precedes an actual access or DoS attack. First, the malicious intruder typically conducts a ping sweep of the target network to determine which IP addresses are alive. Then the intruder determines which services or ports are active on the live IP addresses. From this information, the intruder queries the ports to determine the type and version of the application and operating system running on the target host.

Reconnaissance is somewhat analogous to a thief investigating a neighborhood for vulnerable homes, such as an unoccupied residence or a house with an easy-to-open door or window to break into. In many cases, intruders look for vulnerable services that they can exploit later when there is less likelihood that anyone is looking.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 61: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Building a Simple Network 1-39

Access Attacks Access attacks exploit known vulnerabilities in authentication services, FTP services, and web services to gain entry to web accounts, confidential databases, and other sensitive information.

Password Attacks “Password attack” usually refers to repeated attempts to identify a user account, password, or both. These repeated attempts are called “brute-force attacks.” Password attacks are implemented using other methods too, including Trojan horse programs, IP spoofing, and packet sniffers

A security risk lies in the fact that passwords are stored as cleartext. You need to encrypt passwords to overcome risks. On most systems, passwords are processed through an encryption algorithm that generates a one-way hash on passwords. You cannot reverse a one-way hash back to its original text. Most systems do not decrypt the stored password during authentication—they store the one-way hash. During the login process, you supply an account and password, and the password encryption algorithm generates a one-way hash. The algorithm compares this hash to the hash stored on the system. If the hashes are the same, the algorithm assumes that the user supplied the proper password.

Remember that passing the password through an algorithm results in a password hash. The hash is not the encrypted password, but rather a result of the algorithm. The strength of the hash is that the hash value can be recreated only with the original user and password information, and that retrieving the original information from the hash is impossible. This strength makes hashes perfect for encoding passwords for storage. In granting authorization, the hashes, rather than the plain password, are calculated and compared.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 62: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

1-40 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-8

Password Attack Threat Mitigation

Here are password attack threat-mitigation techniques:Do not allow users to use the same password on multiple systems.Disable accounts after a certain number of unsuccessful login attempts.Do not use cleartext passwords. Use “strong” passwords; for example, “mY8!Rthd8y” rather than “mybirthday.”

Password attack threat-mitigation methods include these guidelines:

Do not allow users to have the same password on multiple systems. Most users have the same password for each system they access, as well as for their personal systems.

Disable accounts after a specific number of unsuccessful logins. This practice helps to prevent continuous password attempts.

Do not use cleartext passwords. Use either a one-time password (OTP) or an encrypted password.

Use strong passwords. Strong passwords are at least eight characters long and contain uppercase letters, lowercase letters, numbers, and special characters. Many systems now provide strong password support and can restrict users to strong passwords only.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 63: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Building a Simple Network 1-41

Summary This topic summarizes the key points that were discussed in this lesson.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-9

Summary

Sophisticated attack tools and open networks continue to generate an increased need for network security policies and infrastructure to protect organizations from internally and externally based attacks. Organizations must balance network security needs against e-business processes, legal issues, and government policies. Establishing a network security policy is the first step in changing a network over to a secure infrastructure.Network adversaries come in many shapes and sizes and with multiple motivations.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-10

Summary (Cont.)

It is very important to provide physical installation security for enterprise network devices.Password attack threats can be mitigated.– Restrict password use.– Disable accounts after unsuccessful logins.– Do not use cleartext passwords; use strong passwords.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 64: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

1-42 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

References For additional information, refer to these resources:

Much of the material in this lesson comes from readily available documents provided by many government agencies. The Information Assurance Technical Framework Forum (IATFF) is a National Security Agency (NSA)-sponsored outreach activity created to foster dialog aimed at seeking solutions for information assurance problems. The IATFF website can be found at http://www.iatf.net.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 65: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

Lesson 3

Understanding the Host-to-Host Communications Model

Overview The Open Systems Interconnection (OSI) reference model was created to help define how network processes function in general, including the various components of networks and transmission of data. Understanding the structure and purpose of the OSI model is central to understanding how one host communicates with another. This lesson introduces the OSI model and describes each of its layers.

Objectives Upon completing this lesson, you will be able to describe the layers of the OSI model and describe how to classify devices and their functions according to their layer in the OSI model. This ability includes being able to meet these objectives:

Identify the requirements of a host-to-host communications model

Define the purpose of the OSI reference model

Define the characteristics, functions, and purposes of each of the OSI layers

Describe the process of encapsulation and de-encapsulation

Describe how peer-to-peer communication works

List the purposes and functions of the TCP/IP suite in data communications

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 66: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

1-44 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

Understanding Host-to-Host Communications Host-to-host communications requires a consistent model. The model addresses hardware, software, and data transmission. This topic describes the purpose of this model.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-2

Understanding Host-to-Host Communications

Older model– Proprietary– Application and combinations software controlled by one

vendorStandards-based model– Multivendor software– Layered approach

The early development of networks was chaotic in many ways. The original host-to-host communications models were proprietary with each vendor controlling its own application and embedded communication software. An application written by one vendor would not function on a network developed by another vendor.

Business drivers and technology advances led a push for a multivendor solution. The first step was to separate application software from communications software. This allowed new communications technologies to be implemented without requiring new applications, but it still required a single-vendor solution for communications software and hardware.

It became apparent that a multivendor solution for communications software and hardware would require a layered approach with clearly defined rules for interlayer interaction. Within a layered model, hardware vendors could design hardware and software to support emerging physical-level technologies (that is, Ethernet, Token Ring, Frame Relay, and so on) while other vendors could write software to be used by network operating systems that control host communications.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 67: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Building a Simple Network 1-45

The OSI Reference Model The OSI reference model provides a means of describing how data is transmitted over a network. The model addresses hardware, software, and data transmission. This topic describes the purpose of the OSI model.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-3

Why a Layered Network Model?

Reduces complexityStandardizes interfacesFacilitates modular engineeringEnsures interoperable technologyAccelerates evolutionSimplifies teaching and learning

The early development of networks was chaotic in many ways. The early 1980s saw tremendous increases in the number and sizes of networks. As companies realized that they could save money and gain productivity by using networking technology, they added networks and expanded existing networks as rapidly as new network technologies and products were introduced.

By the mid-1980s, companies began to experience difficulties from all of the expansions they had made. It became more difficult for networks using different specifications and implementations to communicate with one another. The companies realized that they needed to move away from proprietary networking systems—those systems that are privately developed, owned, and controlled. In the computer industry, “proprietary” is the opposite of “open.” Proprietary means that one company or a small group of companies controls all use of the technology. Open means that use of the technology is available free to the public.

To address the problem of networks being incompatible and unable to communicate with one another, the International Organization for Standardization (ISO) researched different network schemes. As a result of this research, the ISO created a model that would help vendors create networks that would be compatible with, and operate with, other networks.

The OSI reference model, released in 1984, was the descriptive scheme that the ISO created. It provided vendors with a set of standards that ensured greater compatibility and interoperability between the various types of network technologies produced by companies around the world. Although other models exist, most network vendors today relate their products to the OSI reference model, especially when they want to educate customers on the use of their products.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 68: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

1-46 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

The OSI model is considered the best tool available for teaching people about sending and receiving data on a network.

The OSI reference model separates network functions into seven categories. This separation of networking functions is called layering. The OSI reference model has seven numbered layers, each illustrating a particular network function. The OSI model defines the network functions that occur at each layer. More importantly, the OSI model facilitates an understanding of how information travels throughout a network. In addition, the OSI model describes how data travels from application programs (for example, spreadsheets) through a network medium, to an application program located in another computer, even if the sender and receiver are connected using different network media.

The OSI reference model provides a number of benefits in understanding how networks function, by doing the following:

Reducing complexity: The OSI model breaks network communications into smaller, simpler parts.

Standardizing interfaces: The OSI model standardizes network components to allow multiple-vendor development and support.

Facilitating modular engineering: The OSI model allows different types of network hardware and software to communicate with one another.

Ensuring interoperable technology: The OSI model prevents changes in one layer from affecting the other layers, allowing for quicker development.

Accelerating evolution: The OSI model provides for effective updates and improvements to individual components without affecting other components or having to rewrite the entire protocol.

Simplifying teaching and learning: The OSI model breaks network communications into smaller components to make learning easier.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 69: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Building a Simple Network 1-47

The OSI Model Layers and Their Functions Each OSI layer has a specific function and associated software or devices. This topic describes each layer and its functions.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-4

The Seven Layers of the OSI Model

Layer 1: The Physical Layer The physical layer defines the electrical, mechanical, procedural, and functional specifications for activating, maintaining, and deactivating the physical link between end systems. Characteristics such as voltage levels, timing of voltage changes, physical data rates, maximum transmission distances, physical connectors, and other similar attributes are defined by physical layer specifications.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 70: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

1-48 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-5

The Seven Layers of the OSI Model (Cont.)

Layer 2: The Data Link Layer The data link layer defines how data is formatted for transmission and how access to the physical media is controlled. This layer also typically includes error detection and correction to ensure reliable delivery of the data.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 71: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Building a Simple Network 1-49

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-6

The Seven Layers of the OSI Model (Cont.)

Layer 3: The Network Layer The network layer provides connectivity and path selection between two host systems that may be located on geographically separated networks. The growth of the Internet has increased the number of users accessing information from sites around the world, and the network layer is the layer that manages this connectivity.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 72: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

1-50 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-7

The Seven Layers of the OSI Model (Cont.)

Layer 4: The Transport Layer The transport layer segments data from the system of the sending host and reassembles the data into a data stream on the system of the receiving host. For example, business users in large corporations often transfer large files from field locations to a corporate site. Reliable delivery of the files is important, so the transport layer will break down large files into smaller segments that are less likely to incur transmission problems.

The boundary between the transport layer and the session layer can be thought of as the boundary between application protocols and data-flow protocols. Whereas the application, presentation, and session layers are concerned with application issues, the lower four layers are concerned with data transport issues.

The transport layer shields the upper layers from transport implementation details. Specifically, issues such as reliability of transport between two hosts are assigned to the transport layer. In providing a communication service, the transport layer establishes, maintains, and properly terminates virtual circuits. Transport error detection and recovery and information flow control ensure reliable service.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 73: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Building a Simple Network 1-51

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-8

The Seven Layers of the OSI Model (Cont.)

Layer 5: The Session Layer The session layer establishes, manages, and terminates sessions between two communicating hosts. The session layer also synchronizes dialog between the presentation layers of the two hosts and manages their data exchange. For example, web servers have many users, so there are many communication processes open at a given time. It is important, then, to keep track of which user communicates on which path. In addition to session regulation, the session layer offers provisions for efficient data transfer, class of service (CoS), and exception reporting of session layer, presentation layer, and application layer problems.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 74: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

1-52 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-9

The Seven Layers of the OSI Model (Cont.)

Layer 6: The Presentation Layer The presentation layer ensures that the information sent at the application layer of one system is readable by the application layer of another system. For example, a PC program communicates with another computer, one using extended binary coded decimal interchange code (EBCDIC) and the other using American Standard Code for Information Interchange (ASCII) to represent the same characters. If necessary, the presentation layer translates between multiple data formats by using a common format.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 75: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Building a Simple Network 1-53

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-10

The Seven Layers of the OSI Model (Cont.)

Layer 7: The Application Layer The application layer is the OSI layer that is closest to the user. This layer provides network services to the applications of the user, such as e-mail, file transfer, and terminal emulation. The application layer differs from the other layers in that it does not provide services to any other OSI layer, but only to applications outside the OSI model. The application layer establishes the availability of intended communication partners and synchronizes and establishes agreement on procedures for error recovery and control of data integrity.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 76: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

1-54 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

Encapsulation and De-Encapsulation Information that is to be transmitted over a network must undergo a process of conversion at both the sending end and the receiving end of the communication. That conversion process is known as encapsulation and de-encapsulation of data. This topic describes the encapsulation and de-encapsulation processes.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-11

Data Encapsulation

Encapsulation The information sent on a network is referred to as data or data packets. If one computer wants to send data to another computer, the data must first be packaged by a process called encapsulation. Encapsulation wraps data with the necessary protocol information before network transit. As the data moves down through the layers of the OSI model, each OSI layer adds a header (and a trailer, if applicable) to the data before passing it down to a lower layer. The headers and trailers contain control information for the network devices and receiver to ensure proper delivery of the data and to ensure that the receiver can correctly interpret the data.

The figure illustrates how encapsulation occurs. It shows the manner in which data travels through the layers. The following steps occur to encapsulate data:

Step 1 The user data is sent from an application to the application layer.

Step 2 The application layer adds the application layer header (Layer 7 header) to the user data. The Layer 7 header and the original user data become the data that is passed down to the presentation layer.

Step 3 The presentation layer adds the presentation layer header (Layer 6 header) to the data. This then becomes the data that is passed down to the session layer.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 77: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Building a Simple Network 1-55

Step 4 The session layer adds the session layer header (Layer 5 header) to the data. This then becomes the data that is passed down to the transport layer.

Step 5 The transport layer adds the transport layer header (Layer 4 header) to the data. This then becomes the data that is passed down to the network layer.

Step 6 The network layer adds the network layer header (Layer 3 header) to the data. This then becomes the data that is passed down to the data link layer.

Step 7 The data link layer adds the data link layer header and trailer (Layer 2 header and trailer) to the data. A Layer 2 trailer is usually the frame check sequence (FCS), which is used by the receiver to detect whether the data is in error. This then becomes the data that is passed down to the physical layer.

Step 8 The physical layer then transmits the bits onto the network media.

Example: Sending a Package through a Postal Service Encapsulation works very similarly to sending a package through a postal service. The first step is to put the contents of the package into a container. Next, you write the address of the location to which you want to send the package on the outside of the container. Then you put the addressed package into the postal service collection bin, and the package begins its route toward its destination.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 78: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

1-56 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-12

Data De-Encapsulation

De-Encapsulation When the remote device receives a sequence of bits, the physical layer at the remote device passes the bits to the data link layer for manipulation. The data link layer performs the following steps:

Step 1 The data link layer checks the data-link trailer (the FCS) to see if the data is in error.

Step 2 If the data is in error, it may be discarded, and the data link layer may ask for the data to be retransmitted.

Step 3 If the data is not in error, the data link layer reads and interprets the control information in the data-link header.

Step 4 The data link layer strips the data-link header and trailer, and then passes the remaining data up to the network layer based on the control information in the data-link header.

This process is referred to as de-encapsulation. Each subsequent layer performs a similar de-encapsulation process.

Example: Receiving a Package The de-encapsulation process is similar to that of reading the address on a package to see if it is for you, and then removing the contents of the package if it is addressed to you.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 79: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Building a Simple Network 1-57

Peer-to-Peer Communication So that data packets can travel from the source to the destination, each layer of the OSI model at the source must communicate with its peer layer at the destination. This topic describes the process of peer-to-peer communication.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-13

Peer-to-Peer Communication

During the process of peer-to-peer communication, the protocols at each layer exchange packets of information called protocol data units (PDUs) between peer layers.

These data packets originate at a source on a network and then travel to a destination. Each layer depends on the OSI layer below it to provide a service. To perform its service function, the lower layer uses encapsulation to put the protocol data unit (PDU) from the upper layer into lower layer data field. Each layer then adds whatever headers the layer needs to perform its function. As the data moves down from Layer 7 through Layer 2 of the OSI model, additional headers are added.

The network layer provides a service to the transport layer, and the transport layer presents data to the network subsystem. The network layer moves the data through the Internet by encapsulating the data and attaching a header to create a packet (the Layer 3 PDU). The header contains information required to complete the transfer, such as source and destination logical addresses.

The data link layer provides a service to the network layer by encapsulating the network layer packet in a frame (the Layer 2 PDU). The frame header contains the physical addresses required to complete the data link functions, and the frame trailer contains the FCS.

The physical layer provides a service to the data link layer, encoding the data-link frame into a pattern of 1s and 0s (bits) for transmission on the medium (usually a wire) at Layer 1.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 80: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

1-58 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

TCP/IP Suite The TCP/IP suite—whose name is actually a combination of just two individual protocols, Transmission Control Protocol (TCP) and Internet Protocol (IP)—is divided into layers, each of which performs specific functions in the data communication process. This topic describes how the layers of TCP/IP are organized into a stack.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-14

Defines four layersUses different names for Layers 1 through 3Combines Layers 5 through 7 into single application layer

TCP/IP Stack

The TCP/IP suite was developed at approximately the same time as the OSI model. Like the OSI model, the TCP/IP suite is a means of organizing components in an order that reflects their functions in relation to one another. The components, or layers, of the TCP/IP stack are as follows:

Network access layer: This layer covers the same processes as the two lower OSI layers:

— Physical layer: The physical layer defines the electrical, mechanical, procedural, and functional specifications for activating, maintaining, and deactivating the physical link between end systems. Characteristics such as voltage levels, timing of voltage changes, physical data rates, maximum transmission distances, physical connectors, and other similar attributes are defined by physical layer specifications.

— Data link layer: The data link layer defines how data is formatted for transmission and how access to the network is controlled.

Internet layer: This layer provides routing of data from the source to the destination by defining the packet and the addressing scheme, moving data between the data link and transport layers, routing packets of data to remote hosts, and performing fragmentation and reassembly of data packets.

Transport layer: The transport layer is the core of the TCP/IP architecture, providing communication services directly to the application processes running on network hosts.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 81: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Building a Simple Network 1-59

Application layer: The application layer provides applications for file transfer, network troubleshooting, and Internet activities and supports network application programming interfaces (APIs) that allow programs that have been created for a particular operating system to access the network.

Note Although this course refers to the TCP/IP stack, it has become common in the industry to shorten this term to “IP stack.”

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 82: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

1-60 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-15

TCP/IP Stack vs. the OSI Model

Both the OSI model and the TCP/IP stack were developed, by different organizations, at approximately the same time as a means to organize and communicate the components that guide the transmission of data. The layers of the TCP/IP stack correspond to the layers of the OSI model:

The TCP/IP network access layer roughly corresponds to the OSI physical and data link layers and is concerned primarily with interfacing with network hardware and accessing the transmission media.

Note Because the TCP/IP network access layer contains both the OSI data link and physical layers, it has become common to modify the classic four-layer TCP/IP module into a five-layer module. In this course, the five-layer model is used.

The TCP/IP Internet layer corresponds closely to the network layer of the OSI model and deals with the addressing of and routing between network devices.

The TCP/IP transport layer, like the OSI transport layer, provides the means for multiple host applications to access the network layer, either in a best-effort mode or through a reliable delivery mode.

The TCP/IP application layer addresses applications that communicate with the lower layers and corresponds to the separate application, presentation, and session layers of the OSI model. The additional layers of the OSI model provide some additional organization of features related to applications.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 83: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Building a Simple Network 1-61

Summary This topic summarizes the key points that were discussed in this lesson.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-16

Summary

The OSI reference model defines the network functions that occurat each layer. The physical layer defines the electrical, mechanical, procedural, and functional specifications for activating, maintaining, and deactivating the physical link between end systems. The data link layer defines how data is formatted for transmission and how access to the physical media is controlled. The network layer provides connectivity and path selection between two host systems that may be located on geographically separated networks.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-17

Summary (Cont.)

The transport layer segments data from the system of the sendinghost and reassembles the data into a data stream on the system of the receiving host. The session layer establishes, manages, and terminates sessions between two communicating hosts.The presentation layer ensures that the information sent at the application layer of one system is readable by the application layer of another system.The application layer provides network services to the applications of the user, such as e-mail, file transfer, and terminal emulation.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 84: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

1-62 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-18

Summary (Cont.)

The information sent on a network is referred to as data or datapackets. If one computer wants to send data to another computer,the data must first be packaged by a process called encapsulation. When the remote device receives a sequence of bits, the physicallayer at the remote device passes the bits to the data link layer for manipulation. This process is referred to as de-encapsulation.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-19

Summary (Cont.)

TCP/IP is now the most widely used protocol for a number of reasons, including its flexible addressing scheme, its usability by most operating systems and platforms, its many tools and utilities, and the need to use it to connect to the Internet.The components of the TCP/IP stack are the network access, Internet, transport, and application layers.The OSI model and the TCP/IP stack are similar in structure and function, with correlation at the physical, data link, network, and transport layers. The OSI model divides the application layer ofthe TCP/IP stack into three separate layers.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 85: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

Lesson 4

Understanding the TCP/IP Internet Layer

Overview There are various aspects to IP addressing, including calculations for constructing an IP address, classes of IP addresses designated for specific routing purposes, and public versus private IP addresses. There are also two different types of IP addresses: IP version 4 (IPv4) and IP version 6 (IPv6). The 32-bit IPv4 address type is currently the most common, but the 128-bit IPv6 address is also in use, and will probably become the more common address type over time. This lesson describes 32-bit IPv4 addressing, except where IPv6 is explicitly identified.

How do end systems initially obtain their IP address information? Although manual assignment of IP address information is possible, it does not scale and is a barrier to deployment and maintenance of networks. Therefore, protocols for the automatic assignment of IP address information have evolved and now provide this essential function without end-user intervention. This lesson describes how IP address protocols function.

Objectives Upon completing this lesson, you will be able to list the sequence of steps used by IP operations to manage IP addresses and to map between IP addresses and MAC addresses. This ability includes being able to meet these objectives:

List the characteristics of the Internet Protocol

Describe the components of an IPv4 address

Describe the structure of an IPv4 address

Describe the classes of IP addresses

Describe reserved IP addresses

Compare public and private IP addresses

Define the function of DHCP in IP addressing

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 86: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

1-64 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

Define the function of DNS in IP addressing

Identify common host tools to determine the IP address of a host

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 87: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Building a Simple Network 1-65

Internet Protocol The IP component of TCP/IP determines where packets of data are to be routed based on their destination addresses, and IP has certain characteristics related to how it handles this function. This topic describes some of the key functions of IP.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-2

Internet Protocol Characteristics

Operates at network layer of OSIConnectionless protocolPackets treated independentlyHierarchical addressingBest-effort deliveryNo data-recovery features

IP uses packets to carry information through the network. A packet is a self-contained, independent entity that contains data and sufficient information to be routed from the source to the destination without reliance on earlier exchanges.

IP has these characteristics:

IP operates at Layer 3 of the OSI model (Network Layer), and Layer 3 of the TCP/IP stack (Internet layer).

IP is a connectionless protocol in which a one-way datagram is sent to the destination without advance notification to the destination device. The destination device receives the data and does not return any status information to the sending device.

IP uses hierarchical addressing in which the network ID is like a street and the host ID is like a house or office building on that street.

IP provides service on a best-effort basis and does not guarantee packet delivery. A packet can be misdirected, duplicated, or lost on the way to its destination.

IP does not provide any special features that recover corrupted packets. These services are instead provided by the end systems of the network.

In real-time voice or video transfers, a few lost packets are tolerable; speed is more important than packet recovery, because recovering packets would delay the real-time process.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 88: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

1-66 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

Example: Delivering a Letter through a Postal Service An analogy of IP services would be mail delivery by a postal service. In this example, you live in San Francisco and your mother lives in New York. You write three separate letters to your mother. You seal each letter in a separate envelope, address each letter to your mother, and write your return address in the upper left-hand corner of each envelope.

You deposit the three letters in the outgoing mail slot at your local post office. The postal service will make the best attempt to deliver the three letters to your mother in New York. However, the postal service will not guarantee that the letters will arrive at their destination. The postal service will not guarantee that all three letters will be handled by the same carrier or take the same route. Finally, the postal service will not guarantee that the letters will arrive in the order in which you mailed them.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 89: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Building a Simple Network 1-67

IP Addressing To facilitate the routing of packets over a network, the TCP/IP protocol suite uses a logical address known as an IP address. This topic describes the components of a 32-bit IPv4 address.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-3

Why IP Addresses?

They uniquely identify each device on an IP network. Every host (computer, networking device, peripheral) must have a unique address.Host ID:– Identifies the individual host– Is assigned by organizations to individual devices

Network.Host

Just as physical street addresses are necessary to identify the location of specific homes and businesses so that mail can reach those real-world locations efficiently, logical IP addresses are used to identify the location of specific devices on an IP network so that data can reach those network locations efficiently. Every host, computer, networking device, or peripheral connected to the Internet has a unique 32-bit IP address that identifies it. Without a structure for allocating all those IP addresses, it would be impossible to route packets efficiently. Learning how IP addresses are structured and how they function in the operation of a network provides an understanding of how IP packets are forwarded over networks using TCP/IP.

The IPv4 address is the most common type of address currently used on the Internet. IPv4 addresses are 32-bit numbers that describe the location of a network device.

An IP address is a hierarchical address and consists of these two parts:

The network address portion (network ID) describes the network of which this IP address is a part. The router maintains information about routes to each network.

The host address component (host ID) identifies a specific endpoint. These endpoints are the servers, computers, and other devices connected to the network.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 90: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

1-68 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

IP Address Fields This topic describes the IP address fields in the IP protocol data unit (PDU).

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-4

IP PDU Header

As you saw in the “Host-to-Host Communication Model” lesson, as data travels down the protocol stack it is encapsulated. At the Internet layer it is encapsulated into a PDU (commonly called a packet). The header for this packet has several fields. In this topic we will focus on two of those fields:

Source Address: Specifies the sending node’s IP address.

Destination Address: Specifies the receiving node’s IP address.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 91: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Building a Simple Network 1-69

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-5

IP Address Format: Dotted Decimal Notation

The binary-to-decimal and decimal-to-binary conversion will be detailed later

in this course.

In any given IP address, some portion of the 32-bit number represents the network and the remaining bits represent the host. While many computers may share the same network address, combining the network address with a host address uniquely identifies any device connected to the network.

As shown in the figure, the IP binary number is 10101100000100001000000000010001.

For usability, these 32-bit numbers are broken up into 4 groups of numbers called octets (1 octet = 8 bits). Each octet is then represented as a decimal number between 0 and 255 and separated by a period, or dot. This scheme is known as “dotted decimal notation.” The IP address shown above can be written as 172.16.128.17 and spoken as “172 dot 16 dot 128 dot 17.”

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 92: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

1-70 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

IP Address Classes To accommodate different sizes of networks and aid in classifying them, IP addresses are divided into categories called classes. This topic describes the IP address classes and the structure of the IP addresses within them.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-6

IP Address Classes: The First Octet

Assigning IP addresses to classes is known as classful addressing. The classes were determined during the early days of the Internet by the Internet Assigned Numbers Authority (IANA).

Each IP address is broken down into a network ID and the host ID. In addition, a bit or bit sequence at the start of each address determines the class of the address. The figure shows three of the five IP address classes, as follows.

Class A The Class A address uses only the first octet (8 bits) of the 32-bit number to indicate the network address. The remaining three octets of the 32-bit number are used for host addresses. The first bit of a Class A address is always “0.” Since the first bit is a 0, the lowest number that can be represented is 00000000 (decimal 0), and the highest number that can be represented is 01111111 (decimal 127). However, these two network numbers, 0 and 127, are reserved and cannot be used as network addresses. Any address that starts with a value between 1 and 126 in the first octet of the 32-bit number is a Class A address.

Class B The Class B address uses two of the four octets (16 bits) to indicate the network address. The remaining two octets specify host addresses. The first 2 bits of the first octet of a Class B address are always binary 10. Starting the first octet with binary 10 ensures that the Class B space is separated from the upper levels of the Class A space. The remaining 6 bits in the first octet may be populated with either 1s or 0s. Therefore, the lowest number that can be

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 93: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Building a Simple Network 1-71

represented with a Class B address is 10000000 (decimal 128), and the highest number that can be represented is 10111111 (decimal 191). Any address that starts with a value in the range of 128 to 191 in the first octet is a Class B address.

Class C In a Class C address, the first three octets (24 bits) of the IP address identify the network portion, with the remaining octet reserved for the host portion. A Class C address begins with binary 110. Therefore, the lowest number that can be represented is 11000000 (decimal 192), and the highest number that can be represented is 11011111 (decimal 223). If an address contains a number in the range of 192 to 223 in the first octet, it is a Class C address.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-7

IP Address Ranges

*127 (01111111) is a Class A address reserved for loopback testing and cannot be assigned to a network.

The figure shows the IP address range of the first octet (in decimal and binary) for IP address classes A–C, as well as the number of host addresses available for each class of addresses.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 94: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

1-72 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

Reserved IP Addresses Certain IP addresses are reserved and cannot be assigned to individual devices on a network. These reserved addresses include a network address, which is used to identify the network itself, and a broadcast address, which is used for broadcasting packets to all of the devices on a network. This topic describes the types of reserved IP addresses and provides examples of each.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-8

Reserved Address

Network Address An IP address that has binary 0s in all host bit positions is reserved for the network address. Therefore, as a Class A network example, 10.0.0.0 is the IP address of the network containing the host 10.1.2.3. As a Class B network example, the IP address 172.16.0.0 is a network address, while 192.16.1.0 would be a Class C network. A router uses the network IP address when it searches its IP route table for the destination network location.

The decimal numbers that fill the first two octets in a Class B network address are assigned. The last two octets contain 0s because those 16 bits are for host numbers and are used for devices that are attached to the network. In the IP address 172.16.0.0, the first two octets are reserved for the network address; it is never used as an address for any device that is attached to it. An example of an IP address for a device on the 172.16.0.0 network would be 172.16.16.1. In this example, 172.16 is the network address portion and 16.1 is the host address portion.

Directed Broadcast Address To send data to all the devices on a network, a broadcast address is used. Broadcast IP addresses end with binary 1s in the entire host part of the address (the host field).

For the network in the example (172.16.0.0), in which the last 16 bits make up the host field (or host part of the address), the broadcast that would be sent out to all devices on that network would include a destination address of 172.16.255.255.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 95: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Building a Simple Network 1-73

The directed broadcast is capable of being routed. However, for some versions of the Cisco IOS operating system, routing directed broadcasts is not the default behavior.

Local Broadcast Address If an IP device wants to communicate with all devices on the local network, it sets the destination address to all 1s (255.255.255.255) and transmits the packet. For example, hosts that do not know their network number and are asking some server for it may use this address. The local broadcast is never routed.

Local Loopback Address A local loopback address is used to let the system send a message to itself for testing. A typical local loopback IP address is 127.0.0.1.

Autoconfiguration IP Addresses When neither a statically nor a dynamically configured IP address is found on startup, those hosts supporting IPv4 link-local addresses (RFC 3927) will generate an address in the 169.254/16 prefix range. This address can be used only for local network connectivity and operates with many caveats, one of which is that it will not be routed. You will mostly see this address as a failure condition when a PC fails to obtain an address via DHCP.

Network ID The network portion of an IP address is also referred to as the network ID, which is important because most hosts on a network can directly communicate only with devices in the same network. If the hosts need to communicate with devices that have interfaces assigned to some other network ID, there must be a network device that can route data between the networks. This is true even when the devices share the same physical media segment.

A network ID enables a router to put a packet onto the appropriate network segment. The host ID helps the router deliver the Layer 2 frame encapsulating the packet to a specific host on the network. As a result, the IP address is mapped to the correct MAC address, which is needed by the Layer 2 process on the router to address the frame.

Host ID Each class of a network allows a fixed number of hosts. In a Class A network, the first octet is assigned to the network, leaving the last three octets to be assigned to hosts. The first host address in each network (all 0s) is reserved for the actual network address, and the final host address in each network (all 1s) is reserved for broadcasts. The maximum number of hosts in a Class A network is 224 – 2 (subtracting the network and broadcast reserved addresses), or 16,777,214.

In a Class B network, the first two octets are assigned to the network, leaving the final two octets to be assigned to hosts. The maximum number of hosts in a Class B network is 216 – 2, or 65,534.

In a Class C network, the first three octets are assigned to the network. This leaves the final octet to be assigned to hosts, so the maximum number of hosts is 28 – 2, or 254.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 96: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

1-74 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

Public and Private IP Addresses Some networks connect to each other through the Internet, while others are private. For instance, the example addresses used in this course are private, which means that they are not assigned to public use. Both public and private IP addresses are required for both of these network types. This topic describes the purpose and sources for public and private IP addresses.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-9

Public IP Addresses

Public IP Addresses Internet stability depends directly on the uniqueness of publicly used network addresses. Therefore, some mechanism is needed to ensure that addresses are, in fact, unique. This responsibility originally rested within an organization known as the InterNIC (Internet Network Information Center). The IANA succeeded the InterNIC. IANA carefully manages the remaining supply of IP addresses to ensure that duplication of publicly used addresses does not occur. Such duplication would cause instability in the Internet and compromise its capability to deliver datagrams to networks using the duplicated addresses.

To obtain an IP address or block of addresses, you must contact an Internet service provider (ISP). The ISP will then contact their upstream registry or their appropriate regional registry at one of these organizations:

APNIC (Asia Pacific Network Information Center)

ARIN (American Registry for Internet Numbers)

RIPE NCC (Réseaux IP Européens Network Coordination Centre)

With the rapid growth of the Internet, public IP addresses began to run out, so new addressing schemes such as Network Address Translation (NAT), classless interdomain routing (CIDR), and IPv6 were developed to help solve the problem.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 97: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Building a Simple Network 1-75

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-10

Private IP Addresses

192.168.0.0 to 192.168.255C

172.16.0.0 to 172.31.255.255B

10.0.0.0 to 10.255.255.255A

Private Address RangeClass

Private IP Addresses While Internet hosts require a globally unique IP address, private hosts that are not connected to the Internet can use any valid address, as long as it is unique within the private network. But because many private networks exist alongside public networks, grabbing “just any address” is strongly discouraged.

In 1994, the IETF released a document titled RFC 1597, which stated that many organizations used TCP/IP and IP addresses, yet remained unconnected to the Internet. RFC 1597 was updated to RFC 1918, suggesting that a block of the available IP address space could be set aside for private networks. Private networks that needed IP for application support without requiring connectivity to the Internet could simply use addresses from those allocated for private use.

Three blocks of IP addresses (one Class A network, 16 Class B networks, and 256 Class C networks) have been designated for private, internal use. Addresses in this range are not routed on the Internet backbone (see figure). Internet routers are configured to discard private addresses.

When addressing a nonpublic intranet, these private addresses can be used instead of globally unique addresses.

When a network using private addresses must connect to the Internet, it is necessary to translate the private addresses to public addresses. This translation process is NAT. A router is often the network device that performs NAT.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 98: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

1-76 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

Dynamic Host Configuration Protocol (DHCP) There are several automated methods, using protocols, for assigning IP addresses. This topic describes the DHCP method for obtaining an IP address.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-11

DHCP

DHCP is used to assign IP addresses automatically and to set TCP/IP stack configuration parameters, such as the subnet mask, default router, and Domain Name System (DNS) servers. DHCP is also used to provide other configuration information as necessary, including the length of time the address has been allocated to the host. DHCP consists of two components: a protocol for delivering host-specific configuration parameters from a DHCP server to a host, and a mechanism for allocating network addresses to hosts.

Using DHCP, a host can obtain an IP address quickly and dynamically. All that is required is a defined range of IP addresses on a DHCP server. As hosts come online, they contact the DHCP server and request address information. The DHCP server selects an address and allocates it to that host. The address is only “leased” to the host, so the host will periodically contact the DHCP server to extend the lease. This lease mechanism ensures that hosts that have been moved or are switched off for extended periods of time do not hold on to addresses that they do not use. The addresses are returned to the address pool by the DHCP server, to be reallocated as necessary.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 99: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Building a Simple Network 1-77

Domain Name System The Domain Name System (DNS) application provides an efficient way to convert human-readable names of IP end systems into machine-readable IP addresses necessary for routing. This topic describes the function of DNS.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-12

Application specified in the TCP/IP suiteA way to translate human-readable names into IP addresses

DNS

DNS is a mechanism to convert symbolic names into IP addresses. The DNS application frees users of IP networks from the burden of having to remember IP addresses. Without this freedom, the Internet would not be as popular or as usable as it has become.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 100: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

1-78 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

Using Common Host Tools to Determine the IP Address of a Host

Most operating systems provide a series of tools that can be used to verify the host addressing. This topic focuses on the tools available in most PCs.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-13

Network Connection

The Network Connections tab under System setup allows you to set and view the IP address configured on the PC. In this example, the PC is configured to obtain the address from a DHCP server.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 101: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Building a Simple Network 1-79

IPCONFIG can be used to display all current TCP/IP network configuration values and refresh Dynamic Host Configuration Protocol (DHCP) and Domain Name System (DNS) settings. Used without parameters, ipconfig displays the IP address, subnet mask, and default gateway for all adapters.

Syntax

ipconfig [/all] [/renew [Adapter]] [/release [Adapter]] [/flushdns] [/displaydns] [/registerdns] [/showclassid Adapter] [/setclassid Adapter [ClassID]]

Parameters

/all: Displays the full TCP/IP configuration for all adapters. Without this parameter, ipconfig displays only the IP address, subnet mask, and default gateway values for each adapter. Adapters can represent physical interfaces, such as installed network adapters, or logical interfaces, such as dialup connections.

/renew [Adapter]: Renews DHCP configuration for all adapters (if an adapter is not specified) or for a specific adapter if the Adapter parameter is included. This parameter is available only on computers with adapters that are configured to obtain an IP address automatically. To specify an adapter name, type the adapter name that appears when you use ipconfig without parameters.

/release [Adapter]: Sends a DHCPRELEASE message to the DHCP server to release the current DHCP configuration and discard the IP address configuration for either all adapters (if an adapter is not specified) or for a specific adapter if the Adapter parameter is included. This parameter disables TCP/IP for adapters configured to obtain an IP address automatically. To specify an adapter name, type the adapter name that appears when you use ipconfig without parameters.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 102: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

1-80 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

/flushdns: Flushes and resets the contents of the DNS client resolver cache. During DNS troubleshooting, you can use this procedure to discard negative cache entries from the cache, as well as any other entries that have been added dynamically.

/displaydns: Displays the contents of the DNS client resolver cache, which includes both entries, preloaded from the local Hosts file and any recently obtained resource records for name queries resolved by the computer. The DNS Client service uses this information to resolve frequently queried names quickly, before querying its configured DNS servers.

/registerdns: Initiates manual dynamic registration for the DNS names and IP addresses that are configured at a computer. You can use this parameter to troubleshoot a failed DNS name registration or resolve a dynamic update problem between a client and the DNS server without rebooting the client computer. The DNS settings in the advanced properties of the TCP/IP protocol determine which names are registered in DNS.

/showclassid Adapter: Displays the DHCP class ID for a specified adapter. To see the DHCP class ID for all adapters, use the asterisk (*) wildcard character in place of Adapter. This parameter is available only on computers with adapters that are configured to obtain an IP address automatically.

/setclassid Adapter [ClassID]: Configures the DHCP class ID for a specified adapter. To set the DHCP class ID for all adapters, use the asterisk (*) wildcard character in place of Adapter. This parameter is available only on computers with adapters that are configured to obtain an IP address automatically. If a DHCP class ID is not specified, the current class ID is removed.

/?: Displays help at the command prompt.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 103: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Building a Simple Network 1-81

Summary This topic summarizes the key points that were discussed in this lesson.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-16

IP network addresses consist of two parts: the network ID and the host ID.IPv4 addresses have 32 bits that are divided into octets and aregenerally shown in dotted decimal form (for example, 192.168.54.18). When written in a binary format, the first bit of a Class A address is always 0, the first 2 bits of a Class B address are always 10, and the first 3 bits of a Class C address are always 110.

Summary

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-17

Certain IP addresses (network and broadcast) are reserved and cannot be assigned to individual network devices.Internet hosts require a unique, public IP address, but private hosts can have any valid private address that is unique within the private network.DHCP is used to assign IP addresses automatically, and also to set TCP/IP stack configuration parameters such as the subnet mask, default router, and DNS servers. DNS is an application that is specified in the TCP/IP suite, providing a means to translate human-readable names into IP addresses.

Summary (Cont.)

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 104: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

1-82 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-18

Host provides tools that can be used to verify the IP address ofthe host:– Network connections– IPCONFIG

Summary (Cont.)

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 105: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

Lesson 5

Understanding the TCP/IP Transport Layer

Overview When computers communicate with one another, certain rules, or protocols, are required to allow them to transmit and receive data in an orderly fashion. Throughout the world, the most widely adopted protocol suite is TCP/IP. Understanding how TCP/IP functions is important for a larger understanding of how data is transmitted in network environments.

The way in which IP delivers a packet of data across a network is a fundamental concept in the TCP/IP architecture used in large networks. Understanding how data is transmitted via IP is central to understanding how the TCP/IP suite of protocols functions overall. This, in turn, adds to an understanding of how data that is communicated across networks can be prioritized, restricted, secured, optimized, and maintained. This lesson describes the sequence of steps in IP packet delivery, and the concepts and structures involved, such as packets, datagrams, and protocol fields, to provide a view of how data is transmitted over large networks.

For the Internet and internal networks to function correctly, data must be delivered reliably. You can ensure reliable delivery of data through development of the application and by using the services provided by the network protocol. In the Open System Interconnection (OSI) and TCP/TP models, the transport layer manages the process of reliable data delivery. The transport layer hides details of any network-dependent information from the higher layers by providing transparent data transfer. The TCP/IP User Datagram Protocol (UDP) and TCP protocols operate between the transport layer and the application layer to hide details of any network-dependent information from the application layer. In addition, learning how UDP and TCP function between the network layer and the transport layer provides a more complete understanding of how data is transmitted in a TCP/IP networking environment. This lesson describes the function of the transport layer and how UDP and TCP operate.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 106: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

1-84 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

Objectives Upon completing this lesson, you will be able to compare and contrast TCP/IP with the OSI model. This ability includes being able to meet these objectives:

Explain the purpose and functions of the transport layer

Contrast connection-oriented transport with connectionless transport

List the characteristics of UDP

List the characteristics of TCP

List common applications provided by TCP/IP

Describe how the protocol stack maps Layer 3 to Layer 4

Describe how the protocol stack maps Layer 4 to applications

Order the steps of the initialization of a TCP connection

Describe the reasons for and the mechanics of flow control

Order the steps in an acknowledgment sequence

Define the function of windowing

Define sequence and acknowledgment numbers

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 107: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Building a Simple Network 1-85

Transport Layer Functions Residing between the application and network layers, the transport layer is fundamental to the operation of the TCP/IP layered network architecture. This topic describes the functions of the transport layer.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-2

Transport Layer

Session multiplexingSegmentationFlow control (when required)Connection-oriented (when required)Reliability (when required)

The network layer routes information to its destination, but it cannot guarantee that the information arrives in correct order, free of errors, or even that it will arrive at all. The transport layer provides two protocols, UDP and TCP, which provide communication services directly to the application process on the host. The “basic service” provided by the transport layer is session multiplexing, which is performed by both UDP and TCP. The “premium service” provided by the transport layer is ensuring reliable delivery, which is performed only by TCP.

The primary duty of the transport layer is the interconnection of application sessions to the network layer, which is provided by both UDP and TCP. If TCP is used, the transport layer has the further responsibilities of establishing end-to-end operations, segmentation, flow control, and applying reliability mechanisms.

Example: UDP—Sending Regular Mail An analogy of the UDP services is using the regular service by the post office to send your bill payments. You address each bill payment to the specific company address, stamp the envelope, and include your return address. The postal service guarantees its best effort to deliver each payment. The postal service does not guarantee delivery, and it is not responsible for letting you know that delivery was successful or unsuccessful. Like regular mail service, UDP is a very simple protocol that provides only the most basic data transfer services.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 108: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

1-86 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

Example: TCP—Sending Mail “Certified” An analogy for the TCP services is sending certified mail through a postal service. Imagine that you live in San Francisco and you have a book that you’d like to send to your mother in New York. Then you discover that the postal service will only handle letters. You rip the pages out of the book, putting each page in a separate envelope. To ensure that your mother reassembles the book correctly, you number each envelope. You address the envelopes and send the first one as “certified” mail. The postal service delivers it by any truck and any route but, because it is certified, upon delivery the carrier must get a signature from your mother and return a certificate of delivery to you.

Sending each page separately is tedious, so you send several envelopes together. The postal service again delivers each envelope by any truck and any route. Your mother signs a separate receipt for each envelope in the batch as she receives them. If one envelope is lost in transit you would not receive a certificate of delivery for that numbered envelope and you would resend that page. After receiving all the envelopes, your mother puts the pages in the right order and pastes them back together to make the book. Like certified mail, TCP is a complex protocol that offers precise and traceable data transfer services.

Session Multiplexing Session multiplexing is an activity in which a single computer, with a single IP address, is able to have multiple sessions occur simultaneously. A session is created when a source machine needs to send data to a destination machine. Most often, this involves a reply, but a reply is not mandatory. The session is created and controlled within the IP network application, which contains the functionality of OSI Layers 5 through 7.

A best-effort session is very simple. The session parameters are sent to UDP. A best-effort session sends data to the indicated IP address using the port numbers provided. Each transmission is a separate event, and no memory or association between transmissions is retained.

When using the reliable TCP service, a connection must first be established between the sender and the receiver before any data can be transmitted. TCP opens a connection and negotiates connection parameters with the destination. During data flow, TCP maintains reliable delivery of the data and, when complete, closes the connection.

For example, you enter a URL for Yahoo into the address line in the Internet Explorer window, and the Yahoo site corresponding to the URL appears. With the Yahoo site open, you can open the browser again in another window and type in another URL (for example, Google). You can open another browser window and type the URL for Cisco.com and it will open. Three sites are open using only one IP connection, because the session layer is sorting the separate requests based on the port number.

Segmentation TCP takes data chunks from the application layers and prepares them for shipment onto the network. Each chunk is broken up into smaller segments which will fit the maximum transmission unit (MTU) of the underlying network layers. UDP, being simpler, does no checking or negotiating and expects the application process to give it data that will work.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 109: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Building a Simple Network 1-87

Flow Control If a sender transmits data faster than the receiver can receive it, the receiver will drop the data, requiring it to be retransmitted. Retransmission can waste time and network resources, which is why most flow control methods try to maximize the transfer rate while minimizing the requirements to retransmit.

In TCP, basic flow control is implemented by acknowledgment by the receiver of the receipt of data; the sender waits for this acknowledgment before sending the next part. However, if the round-trip time (RTT) is significant, the overall transmission rate may slow to an unacceptable level. A mechanism called windowing increases network efficiency when combined with basic flow control. Windowing allows a receiving computer to advertise how much data it is able to receive before transmitting an acknowledgment to the sending computer.

Connection-Oriented Transport Protocol Within the transport layer, a connection-oriented protocol, such as TCP, establishes the session connection and then maintains the connection during the entire transmission. Once the transmission is complete, the session is terminated. This concept is covered in more detail in the “Reliable vs. Best-Effort” topic.

Reliability TCP reliability has these three main objectives:

Recognition and correction of data loss

Recognition and correction of duplicate or out-of-order data

Avoidance of congestion in the network

Reliability is not always necessary. For example, in a video stream, if a packet is dropped and then retransmitted, it will appear out of order. That would be frustrating and confusing to the audience and serve no useful purpose. In real-time applications, such as voice and video streaming, dropped packets can be tolerated, as long as the overall percentage of dropped packets is low.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 110: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

1-88 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

Reliable vs. Best-Effort “Reliable” and “best-effort” are terms that describe two different types of connections between computers. Each type has advantages and disadvantages. This topic describes and compares the two connection types.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-3

Reliable vs. Best-Effort Comparison

Reliable (Connection-Oriented) TCP is the reliable protocol at the transport layer. To support the reliable part of TCP operation, a connection is established. During this initial process, an exchange of information about the capabilities of the receiver and agreement of starting parameters is made. These parameters are then used for the tracking of the data transfer for the duration of the connection.

When the sending computer transmits data, it gives the data a sequence number. The receiver then responds with an acknowledgment number equal to the next expected sequence number. This exchange of sequence and acknowledgment numbers allows the protocol to recognize when data gets lost or duplicated, or arrives out of order. TCP is a complex transport layer protocol; this module provides only a very high-level discussion of the TCP operational details.

Best-Effort (Connectionless) UDP, being best-effort, does not need or want to keep information about data previously sent. Therefore, UDP does not need to establish any connection with the receiver—thus the term “connectionless.” There are many situations in which this type of connection is more desirable than a reliable one. A connectionless connection is desirable for applications that require faster communication without verification of receipt.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 111: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Building a Simple Network 1-89

UDP The transport layer of the TCP/IP stack contains protocols that provide addressing information so that data can be transmitted over a network. The UDP is an expansion of the early TCP/IP suite and is one of those protocols. This topic describes some of the major functions of UDP.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-4

Operates at transport layer of OSI and TCP/IP modelsProvides applications with access to the network layer without the overhead of reliability mechanismsIs a connectionless protocolProvides limited error checkingProvides best-effort deliveryHas no data-recovery features

UDP Characteristics

A description of UDP includes these characteristics:

UDP operates at Layer 4 (transport layer) of the OSI model and the TCP/IP stack.

UDP provides applications with access to the network layer without the overhead of reliability mechanisms.

Like IP, UDP is a connectionless protocol in which a one-way datagram is sent to a destination without advance notification to the destination device.

UDP is capable of performing a very limited form of error checking. The UDP datagram includes an optional checksum value, which the receiving device can use to test the integrity of the data. In addition, the UDP datagram includes a pseudo-header that includes the destination address; if the receiving device sees that the datagram is directed to an inactive port, it returns a message that the port is unreachable.

UDP provides service on a best-effort basis, and does not guarantee data delivery because packets can be misdirected, duplicated, or lost on the way to their destination.

UDP does not provide any special features that recover lost or corrupted packets. These services are instead provided by the end systems of the network that use UDP if they are required.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 112: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

1-90 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

Example: Sending Advertising Flyers An analogy to the UDP protocol services would be using a postal service to send fliers notifying neighbors about a garage sale. In this example, the seller makes up a flier advertising the day, time, and location of the garage sale. The seller addresses each flier with the specific name and address of each neighbor within a two-mile radius. The postal service delivers each flier by any truck and any route. However, the seller does not use “certified” mail, because it is not important if a flier is lost in transit or if a neighbor acknowledges receipt of the flier.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-5

UDP Header

The UDP header length is always 64 bits. The field definitions in the UDP segment (see figure) include the following:

Source port: Number of the calling port (16 bits)

Destination port: Number of the called port (16 bits)

Length: Length of UDP header and UDP data (16 bits)

Checksum: Calculated checksum of the header and data fields (16 bits)

Data: Upper-layer protocol (ULP) data (varies in size)

Protocols that use UDP include TFTP, Simple Network Management Protocol (SNMP), Network File System (NFS), and Domain Name System (DNS).

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 113: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Building a Simple Network 1-91

TCP TCP stands for Transmission Control Protocol. It is a connection-oriented protocol that provides data reliability between hosts. TCP has a number of unique characteristics related to the way in which it accomplishes this transmission. This topic describes the major characteristics of TCP.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-6

TCP Characteristics

Transport layer of the TCP/IP stackAccess to the network layer for applicationsConnection-oriented protocolFull-duplex mode operationError checkingSequencing of data packetsAcknowledgement of receiptData-recovery features

TCP is another protocol in the transport layer of the TCP/IP stack that provides addressing information so that data can be transmitted over a network.

TCP is characterized as follows:

Like UDP, TCP operates at Layer 4 (transport layer) of the OSI model and the TCP/IP stack.

Like UDP, TCP provides a service to the applications: access to the network layer.

TCP is a connection-oriented protocol in which two network devices set up a connection to exchange data. The end systems synchronize with one another to manage packet flows and adapt to congestion in the network.

A TCP connection is a pair of virtual circuits, one in each direction, so it operates in full-duplex mode.

TCP provides error checking by including a checksum in the datagram to verify that the TCP header information is not corrupt.

TCP segments are numbered and sequenced so the destination can reorder segments and determine if data is missing.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 114: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

1-92 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

Upon receipt of one or more TCP segments, the receiver returns an acknowledgment to the sender indicating that it received the segment. If segments are not acknowledged, the sender may retransmit the segment, or it may terminate the connection if it determines that the receiver is no longer on the connection.

TCP provides recovery services in which the receiver can request retransmission of a segment. If a segment receipt is not acknowledged, the sender will resend the segment.

Reliable data delivery services are critical for applications such as file transfers, database services, transaction processing, and other mission-critical applications in which delivery of every packet must be guaranteed. TCP provides this reliability, sometimes sacrificing speed, while UDP provides speed at the expense of reliability.

Example: Sending Mail Certified An analogy to the TCP protocol services would be sending certified mail through a postal service. Suppose that you live in San Francisco and want to send a book to your mother in New York, but the postal service will only handle letters. You rip the pages out of the book, putting a group of pages in separate envelopes. To ensure that your mother reassembles the book correctly, you number each envelope with the last page number of the group. You address the envelopes and send the first one certified mail. The postal service delivers the first envelope by any truck and any route. However, upon delivery of that envelope, the carrier must get a signature from your mother and return that certificate of delivery to you. Sending each group separately is tedious, so you send several envelopes together. The postal service again delivers each envelope by any truck and any route. Your mother signs a separate receipt for each envelope in the batch as she receives them. If one envelope is lost in transit, you would not receive a certificate of delivery for that numbered envelope and you would resend all of the pages of the group. After receiving all the envelopes, your mother puts the pages in the right order and pastes them back together to make the book.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 115: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Building a Simple Network 1-93

TCP Header The TCP header supplies information that is specific to the TCP protocol. This topic describes the components of the TCP header.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-7

TCP Header

TCP segments are sent using IP packets. The TCP header follows the IP header, supplying information specific to the TCP protocol. This division of the headers allows host-level protocols other than TCP to exist. The fields of the TCP header include the following:

Source port: Number of the calling port (16 bits)

Destination port: Number of the called port (16 bits)

Sequence number: The sequence number of the first data octet in this segment, used to ensure correct sequencing of the arriving data (32 bits)

Acknowledgment number: Next expected TCP octet (32 bits)

Header length: Number of 32-bit words in the header (4 bits)

Reserved: Set to 0 (3 bits)

Control bits: Control functions such as setup, congestion, and termination of a session (9 bits) (A single bit that has a specific meaning is often referred to as a flag.)

Window: Number of octets that the device is willing to accept (16 bits)

Checksum: Calculated checksum of the header and data fields (16 bits)

Urgent: Indicates the end of the urgent data (16 bits)

Options: One currently defined—maximum TCP segment size (0 or 32 bits, if any)

Data: Upper-layer protocol data (varies in size)

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 116: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

1-94 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

TCP/IP Applications In addition to including the IP, TCP, and UDP protocols, the TCP/IP suite also includes applications that support other services such as file transfer, e-mail, and remote login. This topic describes three major TCP/IP applications.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-8

File transfer– FTP – TFTP – Network File System

E-mail– Simple Mail Transfer Protocol

Remote login– Telnet – rlogin

Network management– Simple Network Management

ProtocolName management– Domain Name System

TCP/IP Application Layer Overview

These are some of the applications that TCP/IP supports:

File Transfer Protocol (FTP): FTP is a reliable, connection-oriented service that uses TCP to transfer files between systems that support FTP. FTP supports bidirectional binary and ASCII file transfers.

Trivial File Transfer Protocol (TFTP): TFTP is a connectionless service that uses UDP. Routers use TFTP to transfer configuration files and Cisco IOS images, and to transfer files between systems that support TFTP.

Telnet: Telnet provides the capability to remotely access another computer. Telnet enables a user to log in to a remote host and execute commands.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 117: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Building a Simple Network 1-95

Mapping Layer 3 to Layer 4 IP transfers information in the form of packets, also called datagrams. This topic describes how the protocol stack maps Layer 3 to Layer 4.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-9

Mapping Layer 3 to Layer 4

In this topic we focus on the protocol field, another of the fields in the IP packet header. IP uses a protocol number in the datagram header to identify the ULP to which the data field of the datagram will be passed, and each number relates to a different protocol. This topic describes the protocol field structure.

The host or router reads the protocol number from the header of the datagram, compares it to the entries in the transport protocol table, and then passes it to the appropriate protocol. For example, if the protocol number is 6, IP delivers the datagram to TCP. If the protocol number is 17, IP delivers the datagram to UDP.

Although most traffic uses TCP or UDP, which use IP at the network layer as a transport, there are other protocols that can use IP as a transport. Approximately 100 other transport layer protocols have registered protocol numbers that allow them to use IP as a transport.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 118: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

1-96 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

Mapping Layer 4 to Applications UDP and TCP use internal software ports to support multiple conversations between different network devices. This topic describes the different port numbers used by UDP and TCP protocols.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-10

Mapping Layer 4 to Applications

A single host may have multiple sessions running at the same time, connected to one or more computers. Each session must be distinguished from other sessions, and this is done with port numbers. Each of these sessions is multiplexed through the same network interface and local network link. Segments from each of these sessions are interleaved and sent through the network interface. A port can be thought of as a message queue through which these segments pass.

The Internet Assigned Numbers Authority (IANA) controls port numbers. Some frequently used applications have permanently assigned port numbers. These are referred to as “well-known” port numbers. For example, Telnet always uses port 23. Other applications may use port numbers that are dynamically assigned, although they will be within a specific range.

End systems also use well-known, or registered, port numbers to select the proper destination application. Port numbers, which identify the upper-layer session that is using the transport, are dynamically assigned in the range 49152 to 65535 by the sending host.

UDP-Delivered Applications UDP delivers these applications, among others:

Trivial File Transfer Protocol (TFTP): TFTP is a simple file transfer protocol. Most commonly, it is used to copy and install the operating system of a computer from the files located on a TFTP server. TFTP is a smaller application than File Transfer Protocol (FTP), and is typically used on networks for simple file transfer. TFTP contains its own error checking and sequencing number and, therefore, does not need the transport layer.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 119: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Building a Simple Network 1-97

Simple Network Management Protocol (SNMP): SNMP monitors and manages networks, the devices connected to them, and network performance information. SNMP sends PDU messages that allow network management software to control devices on the network.

TCP-Delivered Applications TCP delivers these applications, among others:

FTP: FTP is a full-featured application used for copying files by running a client application on one computer to contact the FTP server application on a remote computer. Files can be uploaded or downloaded using this application.

Telnet: Telnet allows for an emulated terminal session to a remote device, often a UNIX host, router, or switch. With an emulated terminal session, you can manage a network device as if you had a directly connected serial terminal. Telnet is useful only with systems that use character mode command syntax. Telnet does not support controlling GUI environments. Because Telnet sends its message in unencrypted cleartext, most organizations now use Secure Shell (SSH) for remote communications.

The figure shows the range of port numbers available for each protocol and some of the corresponding applications.

Well-Known Ports Well-known ports are assigned by the IANA and are numbered 1023 and below. These numbers are assigned to applications that are fundamental to the Internet.

Registered Ports Registered ports are listed by IANA and are numbered from 1024 to 49151. These ports are used for proprietary applications, such as Lotus Mail.

Dynamically Assigned Ports Dynamically assigned ports are assigned numbers between 49152 and 65535. These ports are assigned dynamically for the duration of a specific session.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 120: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

1-98 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

Establishing a Connection with a Peer System The user of a reliable transport-layer service must establish a connection-oriented session with its peer system. This topic describes the basic concept of a connection-oriented session.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-11

Establishing a Connection

For data transfer to begin, both the sending and the receiving applications inform their respective operating systems that a connection will be initiated. One machine initiates a connection that must be accepted by the other. Protocol software modules in the two operating systems communicate by sending messages across the network to verify that the transfer is authorized and that both sides are ready.

After successful synchronization has occurred, the two end systems have established a connection and data transfer can begin. During transfer, the two machines continue to verify that the connection is still valid.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 121: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Building a Simple Network 1-99

Three-Way Handshake TCP requires a connection to be established between two end systems before data transfer can begin.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-12

Three-Way Handshake

CTL = Which control bits in the TCP header are set to 1

TCP establishes the connection using a process called the three-way handshake. This process involves setting the synchronization (SYN) bit and acknowledgment (ACK) bit in the segments between the two devices. Another important function performed during connection establishment is that the first device informs the second device of the initial sequence number (ISN), which is used to track data bytes on this connection. The table includes a simplified explanation of the three-way handshake process.

TCP Connection Setup Procedure

Step Action Notes

1. The connection requestor sends a synchronization segment to the receiving device (SYN bit set), starting the handshake process.

The synchronization segment specifies number of the port to which the sender wants to connect. The synchronization segment also contains the ISN value to be used by the acknowledgment process.

2. The receiving device responds with a segment with the SYN bits, ACK bits set to negotiate the connection and acknowledge receipt of the synchronization segment of the sender.

The receiving device responds by indicating the sequence number of the next byte of data the receiver expects from the sender. The next sequence number is the ISN of the sender incremented by one.

3. The initiating device acknowledges the synchronization segment of the receiver.

The SYN bit is unset in the TCP header, confirming that the three-way handshake is completed.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 122: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

1-100 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

Flow Control Flow control prevents the problem of a sender overflowing the buffers in the receiver. This topic describes flow control.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-13

Flow Control

When data transfer is in progress, there can be congestion. The sending computer may be a high-speed device that is capable of generating traffic faster than the network can carry it. Also, if many computers simultaneously send datagrams to a single destination, the destination device can experience congestion while attempting to receive all those datagrams. When datagrams arrive too quickly for the receiving device to process, they will be temporarily stored in memory. This memory space, or buffer, is not infinite; therefore, if datagrams keep coming and the memory is full, datagrams will be discarded, or dropped.

Because lost data is unacceptable, flow control is a requirement of the system. The transport function can issue a “not ready” indicator to the sender. This indicator is actually just the receiving computer advertising a new window size of 0. The not ready indicator tells the sender to stop sending data and wait for a “ready” indicator. Once the receiving computer has processed enough datagrams to make space available, the transport function sends a ready indicator to the sending computer. When the sender receives this indicator, it resumes sending datagrams.

Acknowledgment A TCP connection is a reliable connection; therefore, the sending and receiving computers use acknowledgment to ensure that the data is sent and received as specified and that it arrives without errors and in the right order.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 123: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Building a Simple Network 1-101

Windowing Windowing allows the sending computer to send out a number of packets without receiving acknowledgment of those packets. This helps maintain the speed and reliability of the connection.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 124: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

1-102 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

TCP Acknowledgment TCP performs sequencing of segments with a forward reference acknowledgment. Forward reference acknowledgment comes from the receiving device and tells the sending device which segment it is expecting to receive next. This topic describes how TCP acknowledges receipt of segments.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-14

TCP Acknowledgment

For the purpose of this lesson, the complex operation of TCP is simplified in a number of ways. Simple incremental numbers are used as the sequence numbers and acknowledgments, although in reality the sequence numbers track the number of bytes received. In a TCP simple acknowledgment, the sending computer transmits a segment, starts a timer, and waits for acknowledgment before transmitting the next segment. If the timer expires before receipt of the segment is acknowledged, the sending computer retransmits the segment and starts the timer again.

Imagine that each segment is numbered before transmission (remember that it is really the number of bytes that are tracked). At the receiving station, TCP reassembles the segments into a complete message. If a sequence number is missing in the series, that segment and all subsequent segments may be retransmitted.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 125: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Building a Simple Network 1-103

Acknowledgment Process

Step Action Notes

1. The sender and receiver agree that each segment must be acknowledged before another may be sent.

This occurs during the connection setup procedure by setting the window size to 1.

2. The sender transmits segment 1 to the receiver.

The sender starts a timer and waits for acknowledgment from the receiver.

3. The receiver receives segment 1 and returns ACK = 2.

The receiver acknowledges the successful receipt of the previous segment by stating the expected next segment number.

4. The sender receives ACK = 2 and transmits segment 2 to the receiver.

The sender starts a timer and waits for acknowledgment from the receiver.

5. The receiver receives segment 2 and returns ACK = 3.

The receiver acknowledges the successful receipt of the previous segment.

6. The sender receives ACK = 3 and transmits segment 3 to the receiver.

This process continues until all data is sent.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 126: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

1-104 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

Windowing The TCP window controls the transmission rate to a level where receiver congestion and data loss do not occur. This topic describes the windowing process.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-15

Fixed Windowing

Fixed Windowing In the most basic form of reliable, connection-oriented data transfers, ignoring network congestion issues, the recipient acknowledges the receipt of each data segment to ensure the integrity of the transmission. However, if the sender must wait for an acknowledgment after sending each segment, throughput is low, depending on the round-trip time (RTT) between sending data and receiving the acknowledgment.

Most connection-oriented, reliable protocols allow more than one segment to be outstanding at a time. This can work because there is time available after the sender completes a segment transmission and before the sender processes any acknowledgment of receipt. During this interval, the sender can transmit more data, provided the window at the receiver is large enough to handle more than one segment at a time. The window is the number of data segments the sender is allowed to send without getting acknowledgment from the receiver (see figure).

Windowing allows a specified number of unacknowledged segments to be sent to the receiver, thereby reducing latency. Latency in this instance refers to the amount of time it takes for data to be sent and acknowledgment to be returned.

Example: Throwing a Ball Think of two people standing 50 feet apart. One person throws a football to the other, and that portion of the trip takes 3 seconds. The second person receives the football, throws a ball back (acknowledgment), and that portion of the trip takes 3 seconds. The round trip takes a total of 6 seconds. To do this process three times would take a total of 18 seconds. Now imagine that the

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 127: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Building a Simple Network 1-105

first person has three balls and throws them one after the other. This part of the trip still takes three seconds. The second person throws back one ball to acknowledge the receipt of the third ball, and that portion of the trip again takes three seconds. The round trip takes a total of six seconds. (Of course, this ignores processing time and so on.)

This procedure explains the windowing process in a TCP connection.

Basic Operation, Window Size = 3

Step Action Notes

1. The sender and receiver exchange initial window size of three segments before an acknowledgment must be sent.

This occurs during the connection setup procedure.

2. The sender transmits segments 1, 2, and 3 to the receiver.

The sender transmits the segments, starts a timer, and waits for acknowledgment from the receiver.

3. The receiver receives segment 1, 2, and 3 and returns ACK = 4.

The receiver acknowledges the successful receipt of the previous segments.

4. The sender receives ACK = 4 and transmits segments 4, 5, and 6 to the receiver.

The sender transmits the segments, starts a timer, and waits for acknowledgment from the receiver.

5. The receiver receives segment 4, 5, and 6 and returns ACK = 7.

The receiver acknowledges the successful receipt of the previous segments.

The numbers used in this example are simplified for ease of understanding. These numbers actually represent octets (bytes) and would be increasing in much larger numbers representing the contents of TCP segments, not the segments themselves.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 128: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

1-106 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

TCP Sliding Windowing TCP uses a sliding window technique to specify the number of segments, starting with the acknowledgment number that the receiver can accept. This topic describes TCP sliding windowing.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-16

TCP Sliding Windowing

In fixed windowing, the window size is established and does not change. In sliding windowing, the window size is negotiated at the beginning of the connection and can change dynamically during the TCP session. A sliding window results in more efficient use of bandwidth because a larger window size allows more data to be transmitted pending acknowledgment. Also, if a receiver reduces the advertised window size to 0, this effectively stops any further transmissions until a new window greater than 0 is sent.

In the figure, the window size is 3. The sender can transmit three segments to the receiver. At that point, the sender must wait for acknowledgment from the receiver. After the receiver acknowledges receipt of the three segments, the sender can transmit three more. However, if resources at the receiver become scarce, the receiver can reduce the window size so that it does not become overwhelmed and have to drop data segments.

Each acknowledgment transmitted by the receiver contains a window advertisement that indicates the number of bytes the receiver can accept (the window size). This allows the window to be expanded or contracted as necessary to manage buffer space and processing.

TCP maintains a separate congestion window size (CWS) parameter, which is normally the same size as the window size of the receiver, but the CWS is cut in half when segments are lost. Segment loss is perceived as network congestion. TCP invokes sophisticated back off and restart algorithms so that it does not contribute to network congestion.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 129: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Building a Simple Network 1-107

Sliding Window Operation

Step Action Notes

1. The sender and the receiver exchange their initial window size values. In this example, the window size is 3 segments before an acknowledgment must be sent.

This occurs during the connection setup procedure.

2. The sender transmits segments 1, 2, and 3 to the receiver.

The sender will wait for an acknowledgment from the receiver after sending segment 3.

3. The receiver receives segments 1 and 2, but now can only handle a window size of 2.

ACK = 3 WS = 2

The receiver’s processing may slow down for many reasons, such as when the CPU is searching a database or downloading a large graphic file.

4. The sender transmits segments 3 and 4. The sender will wait for an acknowledgment from the receiver after sending segment 5, when it has two outstanding segments.

5. The receiver acknowledges receipt of segments 3 and 4, but still maintains a window size of 2.

ACK = 5 WS = 2

The receiver acknowledges the successful receipt of segments 3 and 4 by requesting transmission of segment 5.

Maximize Throughput The congestion windowing algorithm manages the rate of sent data. This minimizes both data drop and the time spent recovering dropped data; therefore, efficiency is improved.

Global Synchronization While the congestion windowing algorithm improves efficiency in general, it can also have an extremely negative effect on efficiency by causing global synchronization of the TCP process. Global synchronization is when all the same senders use the same algorithm and their behavior synchronizes. The senders all perceive the same congestion and all back off at the same time. Then, because the senders are all using the same algorithm, they all come back at the same time, which creates waves of congestion.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 130: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

1-108 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

TCP Sequence Number and Acknowledgment Numbers

TCP performs sequencing of segments by providing sequence numbers and acknowledgment numbers in the TCP headers. This topic describes TCP sequence numbers and acknowledgment numbers.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-17

TCP Sequence and Acknowledgment Numbers

Each segment contains the port of the sender (source port), the port of the receiver (destination port), the sequence number, and the acknowledgment number. The port numbers are set up during the initial phase of the TCP connection, and they remain static throughout the connection. The sender generates the sequence numbers before it transmits the segments. Each segment comes with a forward reference ACK number. TCP reassembles the segments into the proper order at the receiver end. Notice that in the figure the sequence more realistically shows the sequence numbers referring to the bytes of data being sent in each segment.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 131: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Building a Simple Network 1-109

Summary This topic summarizes the key points that were discussed in this lesson.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-18

Summary

The purpose of the transport layer is to hide the network requirements from the application layer.Connection-oriented transport provides reliable transport; connectionless transport provides best-effort transport.UDP is a protocol that operates at the transport layer and provides applications with access to the network layer without the overhead of the reliability mechanisms of TCP. UDP is a connectionless, best-effort delivery protocol.TCP is a protocol that operates at the transport layer and provides applications with access to the network layer. TCP is connection-oriented, provides error checking, delivers data reliably, operates in full-duplex mode, and provides some data recovery functions.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-19

Summary (Cont.)

TCP/IP supports a number of applications, including FTP (supports bidirectional binary and ASCII file transfers), TFTP (transfers configuration files and Cisco IOS images), and Telnet(provides capability to remotely access another computer).IP uses a protocol number in the datagram header to identify which protocol to use for a particular datagram.Port numbers are used to map Layer 4 to an application.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 132: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

1-110 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-20

Summary (Cont.)

Flow control avoids the problem of a transmitting host overflowing the buffers in the receiving host and slowing network performance.TCP provides sequencing of segments with a forward reference acknowledgment. When a single segment is sent, receipt is acknowledged and the next segment is then sent.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-21

Summary (Cont.)

The TCP window size decreases the transmission rate to a level at which congestion and data loss do not occur. The TCP window size allows a specified number of unacknowledged segments to be sent.A fixed window is a window with an unchanging size that can accommodate a specific flow of segments.A TCP sliding window is a window that can change size dynamically to accommodate the flow of segments.TCP provides the sequencing of segments by providing sequence numbers and acknowledgment numbers in TCP headers.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 133: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

Lesson 6

Exploring the Packet Delivery Process

Overview The previous lessons discussed the elements that govern host-to-host communications. It is important that you understand how these elements interact. This lesson will cover host-to-host communications by providing a graphic representation.

Objectives Upon completing this lesson, you will be able to describe how a host-to-host connection is made and maintained. This ability includes being able to meet these objectives:

Describe Layer 1 devices and their function

Describe Layer 2 devices and their function

Describe Layer 2 Addressing

Describe Layer 3 devices and their function

Describe Layer 3 Addressing

Describe mapping Layer 2 addressing to Layer 3 addressing

Describe the ARP table

Describe packet delivery (host-to-host)

Describe the function of the default gateway

Use common host tools to determine the path between two hosts across a network

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 134: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

1-112 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

Layer 1 Devices and Their Function This topic describes Layer 1 devices and their function.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-2

Layer 1 Devices

Layer 1 provides the physical media and its encoding.Examples:– Ethernet– Serial– Repeater– Physical interface of the NIC

Layer 1 defines the electrical, mechanical, procedural, and functional specifications for activating, maintaining, and deactivating the physical link between end systems. Some common examples are Ethernet segments and Serial links like Frame Relay and T1. Repeaters which provide signal amplification are also considered Layer 1 devices.

The physical interface on the network interface card (NIC) can also be considered part of Layer 1.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 135: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Building a Simple Network 1-113

Layer 2 Devices and Their Function This topic describes Layer 2 devices and their function.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-3

Layer 2 Devices

Layer 2 devices provide an interface with the physical media.Examples:– NIC– Bridge– Switch

Layer 2 defines how data is formatted for transmission and how access to the physical media is controlled. These devices also provide an interface with the physical media. Some common examples are a NIC installed in a host, bridge, or switch.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 136: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

1-114 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

Layer 2 Addressing Host communications requires a Layer 2 address. This topic covers where the Layer 2 address fits into the host-to-host communications model.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-4

Layer 2 Addressing

MAC addressAssigned to end devices

When the host-to-host communications were first developed there were several network layer protocols called network operating systems (NOSs). Early NOSs were Netware, IP, Open Systems Interconnection (OSI), and Banyan-Vines. It became apparent that there was a need for a Layer 2 address that was independent of the NOS, and so the Media Access Control (MAC) address was created

MAC addresses are assigned to end devices such as hosts. In most cases, Layer 2 network devices such as bridges and switches are not assigned a MAC address. However, there are some special cases where switches may be assigned an address. These will be covered later in this course.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 137: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Building a Simple Network 1-115

Layer 3 Devices and Their Function This topic covers where Layer 3 devices fit into the host-to-host communications model.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-5

Layer 3 Devices and Their Function

The network layer provides connectivity and path selection between two host systems.In the host, this is the path between the data link layer and the upper layers of the NOS. In the router, it is the actual path across the network.

The network layer provides connectivity and path selection between two host systems that may be located on geographically separated networks. In the case of a host, this is the path between the data link layer and the upper layers of the NOS. In the case of a router it is the actual path across the network.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 138: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

1-116 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

Layer 3 Addressing This topic describes where Layer 3 addressing fits into the host-to-host communications model.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-6

Layer 3 Addressing

Each NOS has its own Layer 3 address format.OSI uses an NSAP.TCP/IP uses IP.

Each NOS has its own Layer 3 address format. For example, the OSI model uses a network service access point (NSAP) while TCP/IP uses an IP address. This course will focus on TCP/IP.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 139: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Building a Simple Network 1-117

Mapping Layer 2 Addressing to Layer 3 Addressing

For IP communication on Ethernet-connected networks to take place, it is necessary for the logical (IP) address to be bound to the physical (MAC) address of its destination. This process is carried out by the Address Resolution Protocol (ARP). This topic describes the function of ARP.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-7

ARP

In order to send data to a destination, a host on an Ethernet network must know the physical (MAC) address of the destination. ARP provides the essential service of mapping IP addresses to physical addresses on a network.

The term “address resolution” refers to the process of binding a network layer IP address of a remote device to its locally reachable, data link layer MAC address. The address is “resolved” when ARP broadcasts the known information (the target destination IP address and its own IP address). The broadcast is received by all devices on the Ethernet segment. When the target recognizes itself by reading the contents of the ARP request packet, it responds with the required MAC address in its ARP reply. The address resolution procedure is completed when the originator receives the reply packet (containing the required MAC address) from the target and updates the table containing all of the current bindings. (This table is usually called the ARP cache or ARP table.) The ARP table is used to maintain a correlation between each IP address and its corresponding MAC address.

The bindings in the table are kept current by a process of aging-out unused entries after a period of inactivity. The default time for this aging is usually 300 seconds (5 minutes), ensuring that the table does not contain information for systems that may be switched off or that have been moved.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 140: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

1-118 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

ARP Table The Address Resolution Protocol (ARP) table, or ARP cache, keeps a record of recent bindings of IP addresses to MAC addresses. This topic describes the function of the ARP table.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-8

ARP Table

Each IP device on a network segment maintains a table in its memory , the ARP table, or ARP cache. This table maps the IP addresses of other devices on the network with their physical (MAC) addresses. When a host wants to transmit data to another host on the same network, it searches the ARP table to see if there is an entry. If there is an entry, the host will use it, but if not, ARP will be used to get an entry.

The ARP table is created and maintained dynamically, adding and changing address relationships as they are used on the local host. The entries in an ARP table usually expire after a period of time, by default 300 seconds; however, when the local host wants to transmit data again, the entry in the ARP table is regenerated through the ARP process.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 141: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Building a Simple Network 1-119

Host-to-Host Packet Delivery This topic describes a typical host-to-host communication.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-9

Host-to-Host Packet Delivery (1 of 22)

In this example, an application on the host with a Layer 3 address of 192.168.3.1 wants to send some data to the host with a Layer 3 address of 192.168.3.2. The application wants to use a reliable connection. The application requests this service from the transport layer.

The transport layer selects TCP to set up the session. TCP initiates the session by passing a TCP header with the SYN bit set and the destination Layer 3 address (192.168.3.2) to the IP layer.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 142: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

1-120 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-10

Host-to-Host Packet Delivery (2 of 22)

The IP layer encapsulates the TCP’s SYN in a Layer 2 packet by pre-pending the local Layer 3 address and the Layer 3 address that IP received from TCP. IP then passes the packet to Layer 2.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 143: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Building a Simple Network 1-121

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-11

Host-to-Host Packet Delivery (3 of 22)

Layer 2 needs to encapsulate the Layer 3 packet into a Layer 2 frame. To do this, Layer 2 needs to map the Layer 3 destination address of the packet to its MAC address. It does this by requesting a mapping from the ARP program.

ARP checks its table. In this example, it is assumed that this host has not communicated with the other host so there is no entry in the ARP table. This results in Layer 2 holding the packet until ARP can provide a mapping.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 144: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

1-122 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-12

Host-to-Host Packet Delivery (4 of 22)

The ARP program builds an ARP request and passes it to Layer 2, telling Layer 2 to send the request to a broadcast (all Fs) address. Layer 2 encapsulates the ARP request in a Layer 2 frame using the broadcast address provided by ARP as the destination MAC address, and the local MAC address as the source.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-13

Host-to-Host Packet Delivery (5 of 22)

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 145: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Building a Simple Network 1-123

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-14

Host-to-Host Packet Delivery (6 of 22)

When host 192.168.3.2 receives the frame, it notes the broadcast address and strips the Layer 2 encapsulation.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-15

Host-to-Host Packet Delivery (7 of 22)

The remaining ARP request is passed to ARP.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 146: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

1-124 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-16

Host-to-Host Packet Delivery (8 of 22)

Using the information in the ARP request, ARP updates its table.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-17

Host-to-Host Packet Delivery (9 of 22)

ARP builds a response and passes it to Layer 2, telling Layer 2 to send the response to MAC address 0800:0222:2222 (host 192.168.3.1).

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 147: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Building a Simple Network 1-125

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-18

Host-to-Host Packet Delivery (10 of 22)

Layer 2 encapsulates the ARP in a Layer 2 frame using the destination MAC address provided by ARP and the local source MAC address.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-19

Host-to-Host Packet Delivery (11 of 22)

When host 192.168.3.1 receives the frame, it notes that the destination MAC address is the same as its own address. It strips the Layer 2 encapsulation.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 148: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

1-126 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-20

Host-to-Host Packet Delivery (12 of 22)

The remaining ARP reply is passed to ARP.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-21

Host-to-Host Packet Delivery (13 of 22)

ARP updates its table and passes the mapping to Layer 2.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 149: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Building a Simple Network 1-127

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-22

Host-to-Host Packet Delivery (14 of 22)

Layer 2 can now send the pending Layer 2 packet.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-23

Host-to-Host Packet Delivery (15 of 22)

At host 192.168.3.2, the frame is passed up the stack where encapsulation is removed. The remaining protocol data unit (PDU) is passed to TCP.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 150: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

1-128 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-24

Host-to-Host Packet Delivery (16 of 22)

In response to the SYN, TCP passes a SYN ACK down the stack to be encapsulated.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-25

Host-to-Host Packet Delivery (17 of 22)

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 151: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Building a Simple Network 1-129

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-26

Host-to-Host Packet Delivery (18 of 22)

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-27

Host-to-Host Packet Delivery (19 of 22)

With the three-way handshake completed, TCP can inform the application that the session has been established.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 152: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

1-130 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-28

Host-to-Host Packet Delivery (20 of 22)

Now the application can send the data over the session, relying on TCP for error detection.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-29

Host-to-Host Packet Delivery (21 of 22)

The data exchange will continue until the application stops sending data.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 153: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Building a Simple Network 1-131

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-30

Host-to-Host Packet Delivery (22 of 22)

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 154: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

1-132 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

Function of the Default Gateway This topic describes the function of the default gateway.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-31

Default Gateway

In the previous example, the host was able to use ARP to map a destination’s MAC address to the destination’s IP address. However, this option is available only if the two hosts are on the same network. If the two hosts are on different networks, the sending host must send the data to the default gateway, which will forward the data to the destination.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 155: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Building a Simple Network 1-133

Using Common Host Tools to Determine the Path Between Two Hosts Across a Network

This topic describes commonly available host-based test tools.

Ping is a computer network tool used to test whether a particular host is reachable across an IP network. Ping works by sending ICMP “echo request” packets ("Ping?") to the target host and listening for ICMP “echo response” replies. Using interval timing and response rates, ping estimates the round-trip time (RTT) (generally in milliseconds) and packet-loss rate between hosts.

Syntax

ping [-t] [-a] [-n Count] [-l Size] [-f] [-i TTL] [-v TOS] [-r Count] [-s Count] [{-j HostList | -k HostList}] [-w Timeout] [TargetName]

Parameters

-t: Specifies that ping continue sending echo-request messages to the destination until interrupted. To interrupt and display statistics, press Ctrl-Break. To interrupt and quit ping, press Ctrl-C.

-a: Specifies that reverse name resolution is performed on the destination IP address. If this is successful, ping displays the corresponding host name.

-n Count: Specifies the number of echo-request messages sent. The default is 4.

-l Size: Specifies the length, in bytes, of the Data field in the echo-request messages sent. The default is 32. The maximum size is 65,527.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 156: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

1-134 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

-f: Specifies that echo-request messages are sent with the Don't Fragment flag in the IP header set to 1. The echo-request message cannot be fragmented by routers in the path to the destination. This parameter is useful for troubleshooting path Maximum Transmission Unit (PMTU) problems.

-i TTL: Specifies the value of the Time-To-Live (TTL) field in the IP header for echo-request messages sent. The default is the default TTL value for the host. For Windows XP hosts, this is typically 128. The maximum TTL is 255.

-v TOS: Specifies the value of the Type of Service (TOS) field in the IP header for echo-request messages sent. The default is 0. TOS is specified as a decimal value from 0 to 255.

-r Count: Specifies that the Record Route option in the IP header is used to record the path taken by the echo-request message and corresponding echo-reply message. Each hop in the path uses an entry in the Record Route option. If possible, specify a Count that is equal to or greater than the number of hops between the source and destination. The Count must be a minimum of 1 and a maximum of 9.

-s Count: Specifies that the Internet Timestamp option in the IP header is used to record the time of arrival for the echo-request message and corresponding echo-reply message for each hop. The Count must be a minimum of 1 and a maximum of 4.

-j HostList: Specifies that the echo-request messages use the Loose Source Route option in the IP header with the set of intermediate destinations specified in HostList. With loose source routing, successive intermediate destinations can be separated by one or multiple routers. The maximum number of addresses or names in the host list is nine. The host list is a series of IP addresses (in dotted decimal notation) separated by spaces.

-k HostList: Specifies that the echo-request messages use the Strict Source Route option in the IP header with the set of intermediate destinations specified in HostList. With strict source routing, the next intermediate destination must be directly reachable (it must be a neighbor on an interface of the router). The maximum number of addresses or names in the host list is nine. The host list is a series of IP addresses (in dotted decimal notation) separated by spaces.

-w Timeout: Specifies the amount of time, in milliseconds, to wait for the echo-reply message that corresponds to a given echo-request message to be received. If the echo-reply message is not received within the time-out, the "Request timed out" error message is displayed. The default time-out is 4000 (four seconds).

TargetName: Specifies the destination, which is identified by either IP address or host name.

/?: Displays help at the command prompt.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 157: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Building a Simple Network 1-135

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-8

ARP Table

The arp command displays and modifies entries in the ARP cache, which contains one or more tables that are used to store IP addresses and their resolved Ethernet physical addresses. There is a separate table for each Ethernet or Token Ring network adapter installed on your computer. Used without parameters, the arp command displays help.

Syntax

arp [-a [InetAddr] [-N IfaceAddr]] [-g [InetAddr] [-N IfaceAddr]] [-d InetAddr [IfaceAddr]] [-s InetAddr EtherAddr [IfaceAddr]]

Parameters

-a [InetAddr] [-N IfaceAddr]: Displays current ARP cache tables for all interfaces. To display the ARP cache entry for a specific IP address, use arp -a with the InetAddr parameter, where InetAddr is an IP address. To display the ARP cache table for a specific interface, use the -N IfaceAddr parameter where IfaceAddr is the IP address assigned to the interface. The -N parameter is case-sensitive.

-g [InetAddr] [-N IfaceAddr]: Identical to -a.

-d InetAddr [IfaceAddr] : Deletes an entry with a specific IP address, where InetAddr is the IP address. To delete an entry in a table for a specific interface, use the IfaceAddr parameter where IfaceAddr is the IP address assigned to the interface. To delete all entries, use the asterisk (*) wildcard character in place of InetAddr.

-s InetAddr EtherAddr [IfaceAddr]: Adds a static entry to the ARP cache that resolves the IP address InetAddr to the physical address EtherAddr. To add a static ARP cache entry to the table for a specific interface, use the IfaceAddr parameter where IfaceAddr is an IP address assigned to the interface.

/?: Displays help at the command prompt.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 158: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

1-136 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

The TRACERT diagnostic utility determines the route to a destination by sending Internet Control Message Protocol (ICMP) echo packets to the destination. In these packets, TRACERT uses varying IP TTL values. Because each router along the path is required to decrement the packet's TTL by at least 1 before forwarding the packet, the TTL is effectively a hop counter. When the TTL on a packet reaches zero (0), the router sends an ICMP "Time Exceeded" message back to the source computer.

TRACERT sends the first echo packet with a TTL of 1 and increments the TTL by 1 on each subsequent transmission, until the destination responds or until the maximum TTL is reached. The ICMP "Time Exceeded" messages that intermediate routers send back show the route. Note however that some routers silently drop packets with expired TTL values, and these packets are invisible to TRACERT.

TRACERT prints out an ordered list of the intermediate routers that return ICMP "Time Exceeded" messages. Using the -d option with the tracert command instructs TRACERT not to perform a DNS lookup on each IP address, so that TRACERT reports the IP address of the near-side interface of the routers.

Syntax

tracert -d -h maximum_hops -j host-list -w timeout target_host

Parameters-d: Specifies to not resolve addresses to host names

-h maximum_hops: Specifies the maximum number of hops to search for the target

-j host-list: Specifies loose source route along the host-list

-w timeout: Waits the number of milliseconds specified by timeout for each reply

target_host: Specifies the name or IP address of the target host

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 159: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Building a Simple Network 1-137

Summary This topic summarizes the key points that were discussed in this lesson.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-37

Summary

Layer 1 provides the physical media and its encoding.Layer 2 devices provide an interface with the physical media.Layer 2 addresses are MAC addresses.The network layer provides connectivity and path selection between two host systems.Layer 3 addresses are IP addresses.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-38

Summary (Cont.)

Before a host can send data to another host, it must have the MAC address of that host.If the MAC address is not known, ARP is used to map Layer 2 to Layer 3.Reliable communication requires a TCP session.Data sent must be acknowledged.If hosts are on different segments, a default gateway is needed.Several host-based tools are available to check connectivity between hosts:– ping– tracert– arp

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 160: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

1-138 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 161: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

Lesson 7

Understanding Ethernet

Overview A LAN is a common type of network found in home offices, small businesses, and large enterprises. Understanding how a LAN functions, including network components, frames, Ethernet addresses, and operational characteristics, is important for an overall knowledge of networking technologies.

This lesson describes LANs and provides fundamental knowledge about LAN characteristics, components, and functions. It also describes the basic operations of an Ethernet LAN and how frames are transmitted over it.

Objectives Upon completing this lesson, you will be able to list the characteristics and benefits of a LAN, including its components and their related functions. This ability includes being able to meet these objectives:

Define a LAN

Identify the components of a LAN

List the functions of a LAN

Define LAN sizes

Describe the evolution of Ethernet (IEEE 802.3)

Describe the standards that govern Ethernet

Define how CSMA/CD operates

Identify the fields of an Ethernet frame and explain their functions

List the characteristics of each type of Ethernet frame addressing

Define the purpose and components of an Ethernet address

Define the hexadecimal structure and function of MAC addresses in an Ethernet LAN

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 162: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

1-140 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

Definition of a LAN This topic addresses the definition of a LAN.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-2

Local Area Network

A LAN is a network of computers and other components located relatively close together in a limited area. LANs can vary widely in their size. A LAN may consist of only two computers in a home office or small business, or it may include hundreds of computers in a large corporate office or multiple buildings.

Examples: A Small Office LAN and an Enterprise LAN A small home business or a small office environment could use a small LAN to connect two or more computers and to connect the computers to one or more shared peripheral devices such as printers. A large corporate office could use multiple LANs to accommodate hundreds of computers and shared peripheral devices, for departments such as finance or operations, spanning many floors in an office complex.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 163: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Building a Simple Network 1-141

Components of a LAN Every LAN has specific components, including hardware, interconnections, and software. This topic describes the components of a LAN.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-3

LAN ComponentsComputers– PCs– Servers

Interconnections– NICs– Media

Network devices– Hubs– Switches– Routers

Protocols– Ethernet– IP– ARP– DHCP

Regardless of the size of the LAN, it requires these fundamental components for its operation.

Computers: Computers serve as the end points in the network, sending and receiving data.

Interconnections: Interconnections allow data to travel from one point to another in the network. Interconnections include these components:

— Network interface cards (NICs): NICs translate the data produced by the computer into a format that can be transmitted over the LAN.

— Network media: Network media, such as cables or wireless media, transmit signals from one device on the LAN to another.

Network devices: A LAN requires the following network devices:

— Hubs: Hubs provide aggregation devices operating at Layer 1 of the Open Systems Interconnection (OSI) reference model. However, hubs have been replaced in this function by switches.

— Ethernet switches: Ethernet switches form the aggregation point for LANs. Ethernet switches operate at Layer 2 of the OSI model and provide intelligent distribution of frames within the LAN.

— Routers: Routers, sometimes called gateways, provide a means to connect LAN segments. Routers operate at Layer 3 of the OSI model.

Protocols: Protocols are sets of rules governing data transmission over a LAN and include the following:

— Ethernet protocols

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 164: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

1-142 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

— Internet Protocol (IP)

— Address Resolution Protocol (ARP) and Reverse ARP (RARP)

— Dynamic Host Configuration Protocol (DHCP)

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 165: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Building a Simple Network 1-143

Functions of a LAN This topic describes the functions that are common to LANs.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-4

Functions of a LAN

Data and applicationsShare resourcesProvide communication path to other networks

LANs provide network users with communication and resource-sharing functions:

Data and applications: When users are connected through a network, they can share files and even software application programs. This makes data more easily available and promotes more efficient collaboration on work projects.

Resources: The resources that can be shared include both input devices, such as cameras, and output devices, such as printers.

Communication path to other networks: If a resource is not available locally, the LAN, via a gateway, can provide connectivity to remote resources, for example, access to the web.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 166: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

1-144 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

How Big Is a LAN? A LAN can be configured in a variety of sizes, depending on the requirements of the environment in which it operates. This topic describes the sizes of LANs.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-5

LAN Sizes

LANs can be of various sizes to fit different work requirements, including the following:

Small office, home office (SOHO): The SOHO environment typically has only a few computers and some peripherals such as printers.

Enterprise: The enterprise environment may include many separate LANs in a large office building or in different buildings on a corporate campus. In the enterprise environment, there may be hundreds of computers and peripherals in each LAN.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 167: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Building a Simple Network 1-145

Ethernet Ethernet is the most common type of LAN. This topic describes the history and unique characteristics of Ethernet.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-6

Ethernet Evolution

Ethernet was originally developed in the 1970s by Digital Equipment Corporation (DEC), Intel, and Xerox, and was called DIX Ethernet. It later came to be called thick Ethernet (because of the thickness of the cable used in this type of network), and it transmitted data at 10 megabits per second (Mb/s). The standard for Ethernet was updated in the 1980s to add more capability, and the new version of Ethernet was referred to as Ethernet Version 2 (also called Ethernet II).

The Institute of Electrical and Electronic Engineers (IEEE) is a professional organization that defines network standards. IEEE standards are the predominant LAN standards in the world today. In the mid-1980s, an IEEE workgroup defined new standards for Ethernet-like networks. The set of standards that they created was called Ethernet 802.3 and was based on the Carrier Sense Multiple Access with Collision Detection (CSMA/CD) process. Ethernet 802.3 specified the physical layer (Layer 1), and the Media Access Control (MAC) portion of the data link layer (Layer 2). Today, this set of standards is most often referred to as simply “Ethernet.”

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 168: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

1-146 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

Ethernet LAN Standards Ethernet LAN standards specify cabling and signaling at both the physical and data link layers of the OSI model. This topic describes Ethernet LAN standards at the data link layer.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-7

LAN Standards

The figure shows how LAN protocols map to the OSI reference model.

The IEEE divides the OSI data link layer into two separate sublayers:

Logical Link Control (LLC): Transitions up to the network layer

Media Access Control (MAC): Transitions down to the physical layer

LLC Sublayer The IEEE created the LLC sublayer to allow part of the data link layer to function independently from existing technologies. This layer provides versatility in services to the network layer protocols that are above it, while communicating effectively with the variety of MAC and Layer 1 technologies below it. The LLC, as a sublayer, participates in the encapsulation process.

An LLC header tells the data link layer what to do with a packet when it receives a frame. For example, a host receives a frame and then looks in the frame header to understand that the packet is destined for the IP protocol at the network layer.

MAC Sublayer The MAC sublayer deals with physical media access. The IEEE 802.3 MAC specification defines MAC addresses, which uniquely identify multiple devices at the data link layer. The MAC sublayer maintains a table of MAC addresses (physical addresses) of devices. To participate on the network, each device must have a unique MAC address.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 169: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Building a Simple Network 1-147

The Role of CSMA/CD in Ethernet Ethernet signals are transmitted to every host connected to the LAN, using a special set of rules to determine which station can “talk” at any particular time. This topic describes that set of rules.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-8

CSMA/CD

Ethernet LANs manage the signals on a network by Carrier Sense Multiple Access with Collision Detection (CSMA/CD), which is an important aspect of Ethernet. The figure illustrates the CSMA/CD process.

In an Ethernet LAN, before transmitting, a computer first listens to the network media. If the media is idle, the computer sends its data. After a transmission has been sent, the computers on the network compete for the next available idle time to send another frame. This competition for idle time means that no one station has an advantage over another on the network.

Stations on a CSMA/CD LAN can access the network at any time. Before sending data, CSMA/CD stations listen to the network to determine whether it is already in use. If it is, the CSMA/CD stations wait. If the network is not in use, the stations transmit. A collision occurs when two stations listen for network traffic, hear none, and transmit simultaneously (see the figure). In this case, both transmissions are damaged, and the stations must retransmit at some later time. CSMA/CD stations must be able to detect collisions to know that they must retransmit.

When a station transmits, the signal is referred to as a carrier. The NIC senses the carrier and consequently refrains from broadcasting a signal. If there is no carrier, a waiting station knows that it is free to transmit. This is the “carrier sense” part of the protocol.

The extent of the network segment over which collisions occur is referred to as the collision domain. The size of the collision domain has an impact on efficiency, and therefore on data throughput.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 170: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

1-148 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

In the CSMA/CD process, priorities are not assigned to particular stations, so all stations on the network have equal access. This is the “multiple access” part of the protocol. If two or more stations attempt a transmission simultaneously, a collision occurs. The stations are alerted of the collision, and they execute a backoff algorithm that randomly schedules retransmission of the frame. This scenario prevents the machines from repeatedly attempting to transmit at the same time. Collisions are normally resolved in microseconds. This is the “collision detection” part of the protocol.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 171: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Building a Simple Network 1-149

Ethernet Frames Bits that are transmitted over an Ethernet LAN are organized into frames. This topic describes the structure of an Ethernet frame.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-9

Ethernet Frame Structure

In Ethernet terminology, the “container” into which data is placed for transmission is called a frame. The frame contains header information, trailer information, and the actual data that is being transmitted.

The figure illustrates all of the fields that are in a MAC layer of the Ethernet frame, which include the following:

Preamble: This field consists of seven bytes of alternating 1s and 0s, which are used to synchronize the signals of the communicating computers.

Start-of-frame (SOF) delimiter (802.3 only): This field contains bits that signal the receiving computer that the transmission of the actual frame is about to start and that any data following is part of the packet.

Destination address: This field contains the address of the NIC on the local network to which the packet is being sent.

Source address: This field contains the address of the NIC of the sending computer.

Type/length: In the Ethernet II standard, this field contains a code that identifies the network layer protocol. In the 802.3 standard, this field specifies the length of the data field. Therefore, the protocol information is contained in 802.2 fields, which are at the LLC layer contained in the 802.2 header and data field.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 172: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

1-150 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

Data and pad: This field contains the data that is received from the network layer on the transmitting computer. This data is then sent to the same protocol on the destination computer. If the data is too short, a string of extraneous bits is used to “pad” the field to its minimum length of 46 bytes.

Frame check sequence (FCS): This field includes a checking mechanism to ensure that the packet of data has been transmitted without corruption.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 173: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Building a Simple Network 1-151

Ethernet Frame Addressing Communications in a network occur in three ways: unicast, broadcast, and multicast. Ethernet frames are addressed accordingly. This topic describes the relationship of Ethernet frames to methods of network communications.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-10

Communicating Within the LAN

The three major types of network communications are as follows:

Unicast: Communication in which a frame is sent from one host and addressed to one specific destination. In unicast transmission, there is just one sender and one receiver. Unicast transmission is the predominant form of transmission on LANs and within the Internet.

Broadcast: Communication in which a frame is sent from one address to all other addresses. In this case, there is just one sender but the information is sent to all connected receivers. Broadcast transmission is essential when sending the same message to all devices on the LAN.

Multicast: Communication in which information is sent to a specific group of devices or clients. Unlike broadcast transmission, in multicast transmission clients must be members of a multicast group to receive the information.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 174: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

1-152 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

Ethernet Addresses The address used in an Ethernet LAN, which is associated with the network adapter, is the means by which data is directed to the proper receiving location. This topic describes the specific characteristics of an Ethernet address.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-11

MAC Address Components

The address that is on the network interface card (NIC) is the MAC address—often referred to as the burned-in address (BIA)—and some vendors allow the modification of this address to meet local needs. There are two components of a 48-bit Ethernet MAC address, as follows:

24-bit Organizational Unique Identifier (OUI): The OUI identifies the manufacturer of the NIC card. The IEEE regulates the assignment of OUI numbers. Within the OUI, there are 2 bits that have meaning only when used in the destination address, as follows:

— Broadcast or multicast bit: This indicates to the receiving interface that the frame is destined for all or a group of end stations on the LAN segment.

— Locally administered address bit: Normally the combination of OUI and a 24-bit station address is universally unique; however, if the address is modified locally, this bit should be set.

24-bit vendor-assigned end station address: This uniquely identifies the Ethernet hardware.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 175: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Building a Simple Network 1-153

MAC Addresses and Binary-Hexadecimal Numbers

The MAC address plays a specific role in the function of an Ethernet LAN. This topic describes MAC addresses and their function.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-12

MAC Addresses

The MAC sublayer of the OSI data link layer handles physical addressing issues, and the physical address is a number in hexadecimal format that is actually burned into the NIC. This address is referred to as the MAC address and it is expressed as groups of hexadecimal digits that are organized in pairs or quads, such as the following:

00:00:0c:43:2e:08 or 0000:0c43:2e08

Each device on a LAN must have a unique MAC address to participate in the network. The MAC address identifies the location of a specific computer on a LAN. Unlike other kinds of addresses used in networks, the MAC address should not be changed unless there is some specific need.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 176: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

1-154 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

Summary This topic summarizes the key points that were discussed in this lesson.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-13

Summary

A LAN is a network that is located in a limited area, with the computers and other components that are part of this network located relatively close together. Regardless of its size, several fundamental components are required for the operation of a LAN, including computers, interconnections, network devices, and protocols.LANs provide both communication and resource-sharing functions for their users.LANs can be configured in various sizes, to accommodate environments from SOHO to enterprise.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-14

Summary (Cont.)

Ethernet was originally developed in the 1970s by DEC, Intel, and Xerox, and was called DIX Ethernet. When a workgroup of this body (referred to as IEEE 802.3) defined new standards for Ethernet in the mid-1980s to define Ethernet-like networks for public use, the standards were called Ethernet 802.3 and 802.2.Ethernet LAN standards specify cabling and signaling at both thephysical and data link layers of the OSI model.Stations on a CSMA/CD LAN can access the network at any time. Before sending data, CSMA/CD stations listen to the network to determine whether it is already in use. If it is in use, they wait. If the network is not in use, the stations transmit. A collision occurs when two stations listen for network traffic, hear none, and transmit simultaneously.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 177: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Building a Simple Network 1-155

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-15

Summary (Cont.)

An Ethernet frame consists of fields, including preamble, start-of-frame delimiter, destination address, source address, type/length, data and pad, and frame check sequence.There are three major kinds of communications in networks: unicast, in which a frame is sent from one host addressed to onespecific destination; broadcast, in which a frame is sent from one address to all other addresses; and multicast, in which a destination addresses a specific group of devices.The address used in an Ethernet LAN is the means by which data is directed to the proper receiving location.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-16

Summary (Cont.)

The MAC sublayer handles physical addressing issues, and the physical address is a 48-bit number usually represented in hexadecimal format.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 178: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

1-156 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 179: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

Lesson 8

Connecting to an Ethernet LAN

Overview In addition to understanding the components of an Ethernet LAN and the standards that govern its architecture, it is also important to understand the connection components of an Ethernet LAN. This lesson describes the connection components of an Ethernet LAN, including network interface cards (NICs) and cable.

Objectives Upon completing this lesson, you will be able to list the types and functions of the connection components of an Ethernet LAN. This ability includes being able to meet these objectives:

List the functions of a NIC in an Ethernet LAN

List the connection requirements for an Ethernet LAN

Define the types of Ethernet LAN connection media

List the characteristics of an unshielded twisted-pair cable

Recognize the differences between straight-through and crossover cables, and explain the appropriate uses for each

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 180: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

1-158 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

Ethernet Network Interface Cards A network interface card (NIC) is a printed circuit board that provides network communication capabilities to and from a personal computer on a network. This topic describes a NIC and its functions.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-2

Network Interface Card

Also called a LAN adapter, the NIC plugs into a motherboard and provides a port for connecting to the network. The NIC constitutes the computer interface with the LAN.

The NIC communicates with the network through a serial connection, and with the computer through a parallel connection. When a NIC is installed in a computer, it requires an interrupt request line (IRQ), an input/output (I/O) address, a memory space within the operating system (such as DOS or Windows), and drivers (software) that allow it to perform its function. An IRQ is a signal that informs a CPU that an event needing its attention has occurred. An IRQ is sent over a hardware line to the microprocessor. An example of an interrupt request being issued is when a key is pressed on a keyboard, and the CPU must move the character from the keyboard to RAM. An I/O address is a location in memory used by an auxiliary device to enter data into or retrieve data from a computer.

The MAC address is burned onto each NIC by the manufacturer, providing a unique, physical network address.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 181: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Building a Simple Network 1-159

Ethernet Media and Connection Requirements Distance and time dictate the type of Ethernet connections required. This topic describes the cable and connector specifications used to support Ethernet implementations.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-3

Comparing Ethernet Media Requirements

The cable and connector specifications used to support Ethernet implementations are derived from the EIA/TIA standards body. The categories of cabling defined for Ethernet are derived from the EIA/TIA-568 (SP-2840) Commercial Building Telecommunications Wiring Standards. EIA/TIA specifies an RJ-45 connector for unshielded twisted-pair (UTP) cable.

The figure compares the cable and connector specifications for the most popular Ethernet implementations. The important difference to note is the media used for 10-Mb/s Ethernet versus 100-Mb/s Ethernet. In networks today, where you will see a mix of 10- and 100-Mb/s requirements, you must be aware of the need to change over to UTP Category 5 to support Fast Ethernet.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 182: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

1-160 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

Connection Media Several types of connection media can be used in an Ethernet LAN implementation. This topic describes the various types of connection media.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-4

Differentiating Between Connections

The most common type of connection media is the RJ-45 connector and jack (illustrated in the figure). The letters “RJ” stand for “registered jack” and the number “45” refers to a specific physical connector that has eight conductors.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 183: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Building a Simple Network 1-161

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-5

1000BASE-T GBIC

A Gigabit Interface Converter (GBIC) is a hot-swappable I/O device that plugs into a Gigabit Ethernet port. A key benefit of using a GBIC is that it is interchangeable, allowing you the flexibility to deploy other 1000BASE-X technology without having to change the physical interface or model on the router or switch. GBICs support UTP (copper) and fiber-optic media for Gigabit Ethernet transmission.

Typically, GBICs are used in the LAN for uplinks, and are normally used for the backbone. GBICs are also seen in remote networks.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 184: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

1-162 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-6

Cisco Fiber-Optic GBICs

Short wavelength (1000BASE-SX)Long wavelength/long haul (1000BASE-LX/LH)Extended distance (1000BASE-ZX)

The fiber-optic GBIC is a transceiver that converts serial electric currents to optical signals and converts optical signals to digital electric currents. Optical GBICs include these types:

Short wavelength (1000BASE-SX)

Long wavelength/long haul (1000BASE-LX/LH)

Extended distance (1000BASE-ZX)

Unshielded twisted-pair cable

Twisted-pair is a copper-wire based cable that may be either shielded or unshielded. Unshielded twisted-pair (UTP) cable is frequently used in LANs. This topic describes the characteristics and uses of UTP cable.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 185: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Building a Simple Network 1-163

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-7

Unshielded Twisted-Pair Cable

Speed and throughput: 10 to 1000 Mb/sAverage cost per node: Least expensiveMedia and connector size: SmallMaximum cable length: Varies

UTP cable is a four-pair wire. Each of the eight individual copper wires in UTP cable is covered by an insulating material. In addition, the wires in each pair are twisted around each other. The advantage of UTP cable is its ability to cancel interference, because the twisted-wire pairs limit signal degradation from electromagnetic interference (EMI) and radio frequency interference (RFI). To further reduce crosstalk between the pairs in UTP cable, the number of twists in the wire pairs varies. Both UTP and shielded twisted-pair (STP) cable must follow precise specifications regarding how many twists or braids are permitted per meter.

UTP cable is used in a variety of types of networks. When used as a networking medium, UTP cable has four pairs of either 22- or 24-gauge copper wire. UTP used as a networking medium has an impedance of 100 ohms, differentiating it from other types of twisted-pair wiring, such as that used for telephone wiring. Because UTP cable has an external diameter of approximately 0.43 cm, or 0.17 inches, its small size can be advantageous during installation. Also, because UTP can be used with most of the major networking architectures, it continues to grow in popularity.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 186: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

1-164 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

Here are the categories of UTP cable:

Category 1: Used for telephone communications; not suitable for transmitting data

Category 2: Capable of transmitting data at speeds of up to 4 Mb/s

Category 3: Used in 10BASE-T networks; can transmit data at speeds up to 10 Mb/s

Category 4: Used in Token Ring networks; can transmit data at speeds up to 16 Mb/s

Category 5: Capable of transmitting data at speeds up to 100 Mb/s

Category 5e: Used in networks running at speeds up to 1000 Mb/s (1 Gb/s)

Category 6: Consists of four pairs of 24-gauge copper wires, which can transmit data at speeds of up to 1000 Mb/s

The most commonly used categories in LAN environments today are Categories 1 (used primarily for telephony), 5, 5e, and 6.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 187: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Building a Simple Network 1-165

UTP Implementation For a UTP implementation in a LAN, you must determine the EIA/TIA type of cable needed and also whether to use a straight-through or crossover cable. This topic describes the characteristics and uses of straight-through and crossover cables, as well as the types of connectors used when UTP is implemented in a LAN.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-8

RJ-45 Connector

If you look at the RJ-45 transparent-end connector, you can see eight colored wires, twisted into four pairs. Four of the wires (two pairs) carry the positive or true voltage and are considered “tip” (T1 through T4); the other four wires carry the inverse of false voltage grounded and are called “ring” (R1 through R4). Tip and ring are terms that originated in the early days of the telephone. Today, these terms refer to the positive and negative wires in a pair. The wires in the first pair in a cable or a connector are designated as T1 and R1, the second pair as T2 and R2, and so on.

The RJ-45 plug is the male component, crimped at the end of the cable. As you look at the male connector from the front, as shown in the figure, the pin locations are numbered from 8 on the left to 1 on the right.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 188: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

1-166 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-9

RJ-45 Jack

The jack is the female component in a network device, wall, cubicle partition outlet, or patch panel. As you look at the female connector from the front, as shown in the figure, the pin locations are numbered from 1 on the left to 8 on the right.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 189: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Building a Simple Network 1-167

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-10

Cable 10BASE-T/100BASE-TX Straight-Through

Pin Label Pin Label

12345678

TX+TX-RX+NCNCRX-NCNC

12345678

TX+TX-RX+NCNCRX-NCNC

Straight-Through Cable

Wires on cable endsare in same order.

UTP Implementation (Straight-Through)

In addition to identifying the correct EIA/TIA category of cable to use for a connecting device (depending on which standard is being used by the jack on the network device), you will need to determine which of the following to use:

A straight-through cable

A crossover cable

In a straight-through cable, the RJ-45 connectors on both ends of the cable show all the wires in the same order. If the two RJ-45 ends of a cable are held side by side in the same orientation, the colored wires (or strips or pins) will be seen at each connector end. If the order of the colored wires is the same at each end, the cable type is straight-through (see figure).

Straight-Through Cable

Hub or Server Server or Host

Pin Number Color Function Pin Number Color Function

1 White/Green TX+ 1 White/Green TX+

2 Green TX- 2 Green TX-

3 White/Orange RX+ 3 White/Orange RX+

6 Orange RX- 6 Orange RX-

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 190: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

1-168 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-11

Cable 10BASE-T or100BASE-TX Straight-Through Crossover Cable

Some wires on cableends are crossed.

Pin Label Pin Label

12345678

TX+TX-RX+NCNCRX-NCNC

12345678

TX+TX-RX+NCNCRX-NCNC

EIA/TIA T568A EIA/TIA T568B

UTP Implementation (Crossover)

With crossover cables, the RJ-45 connectors on both ends show that some of the wires on one side of the cable are crossed to a different pin on the other side of the cable. Specifically, for Ethernet, pin 1 at one RJ-45 end should be connected to pin 3 at the other end. Pin 2 at one end should be connected to pin 6 at the other end, as shown in the figure.

Crossover

Hub or Server Server or Host

Pin Number Color Function Pin Number Color Function

1 White/Green TX+ 3 Orange RX+

2 Green TX- 6 White/Orange RX-

3 White/Orange RX+ 1 Green TX+

6 Orange RX- 2 White/Green TX-

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 191: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Building a Simple Network 1-169

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-12

UTP Implementation: Straight-Through vs. Crossover

This figure shows the guidelines for choosing which type of cable to use when interconnecting Cisco devices. In addition to verifying the category specification on the cable, you must determine when to use a straight-through or crossover cable.

Use straight-through cables for the following cabling:

Switch to router

Switch to PC or server

Hub to PC or server

Use crossover cables for the following cabling:

Switch to switch

Switch to hub

Hub to hub

Router to router

Router Ethernet port to PC NIC

PC to PC

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 192: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

1-170 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-13

Using Varieties of UTP

The figure illustrates how a variety of UTP cable types may be required in a given network. Note that the category of UTP required is based on the type of Ethernet that you choose to implement.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 193: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Building a Simple Network 1-171

Summary This topic summarizes the key points that were discussed in this lesson.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-14

Summary

Also called a LAN adapter, the NIC plugs into a motherboard and provides a port for connecting to the network.The MAC address is burned onto each NIC by the manufacturer, providing a unique, physical network address that permits the device to participate in the network.The cable and connector specifications used to support Ethernet implementations are derived from the EIA/TIA standards body.The categories of cabling defined for the Ethernet are derived from the EIA/TIA-568 (SP-2840) Commercial Building Telecommunications Wiring Standards.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-15

Summary (Cont.)

UTP cable is a four-pair wire. Each of the eight individual copper wires in UTP cable is covered by an insulating material, and thewires in each pair are twisted around each other.A crossover cable is used to connect between similar devices (such as switch to switch, router to router, PC to PC, and hub to hub). A straight-through cable is used to connect between dissimilar devices (such as switch to router, switch to PC, hub to router, and hub to PC).

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 194: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

1-172 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 195: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Building a Simple Network 1-173

Module Summary This topic summarizes the key points that were discussed in this module.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-1

A network is a connected collection of devices (computers, interconnections, routers, and switches) that can communicate with each other, providing the means for users to share both hardware and applications.Today’s network must be secured from both physical and network attacks.Ethernet is the most common type of LAN, and it has its own unique characteristics. Standards specify cabling and signaling for Ethernet LANs at both the physical and data link layers of the OSI model.Bits that are transmitted over an Ethernet LAN are organized into frames. Ethernet LANs manage the signals on a network by a process called CSMA/CD.

Module Summary

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 196: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

1-174 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—1-2

Module Summary (Cont.)

Host-to-host communications are governed by OSI and TCP/IP.The OSI reference model defines the network functions that occurat each layer and facilitates an understanding of how information travels throughout a network.TCP/IP defines a 21-bit address that is represented by 4 octets separated by a period.A host address may be manually configured or obtained from a DHCP server.

References For additional information, refer to this resource:

Much of the material in this lesson comes from readily available documents provided by many government agencies. The Information Assurance Technical Framework Forum (IATFF) is a National Security Agency (NSA)-sponsored outreach activity created to foster dialog aimed at seeking solutions for information assurance problems. The IATFF website can be found at http://www.iatf.net.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 197: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Building a Simple Network 1-175

Module Self-Check Use the questions here to review what you learned in this module. The correct answers and solutions are found in the Module Self-Check Answer Key.

Q1) Which three statements about networks are accurate? (Choose three.) (Source: Exploring the Functions of Networking) A) Networks are used to transmit data in many kinds of environments, including

homes, small businesses, and large enterprises. B) A main office can have hundreds or even thousands of people who depend on

network access to do their jobs. C) A network is a connected collection of devices that can communicate with each

other. D) A main office usually has one large network to connect all users. E) The purpose of a network is to create a means to provide all workers with

access to all information and components that are accessible by the network. F) Remote locations cannot connect to a main office through a network.

Q2) What is the purpose of a router? (Source: Exploring the Functions of Networking) A) to interconnect networks and choose the best paths between them B) to provide the connection points for the media C) to serve as the end point in the network, sending and receiving data D) to provide the means by which the signals are transmitted from one networked

device to another

Q3) What is the purpose of a switch? (Source: Exploring the Functions of Networking) A) to connect separate networks and filter the traffic over those networks so that

the data is transmitted through the most efficient route B) to choose the path over which data is sent to its destination C) to serve as the end point in the network, sending and receiving data D) to provide network attachment to the end systems and intelligent switching of

the data within the local network

Q4) What is the purpose of network interconnections? (Source: Exploring the Functions of Networking) A) to connect separate networks and filter the traffic over those networks so that

the data is transmitted through the most efficient route B) to choose the path over which data is sent to its destination C) to provide a means for data to travel from one point to another in the network D) to provide network attachment to the end systems and intelligent switching of

the data within the local network

Q5) Which resource is not sharable on a network? (Source: Exploring the Functions of Networking) A) memory B) applications C) peripherals D) storage devices

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 198: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

1-176 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

Q6) Which three of the following are common network applications? (Choose three.) (Source: Exploring the Functions of Networking) A) e-mail B) collaboration C) graphics creation D) databases E) word processing F) spreadsheets

Q7) Match each network characteristic to its definition. (Source: Exploring the Functions of Networking)

_____ 1. speed

_____ 2. cost

_____ 3. security

_____ 4. availability

_____ 5. scalability

_____ 6. reliability

_____ 7. topology A) indicates how easily users can access the network B) indicates how dependable the network is C) indicates the protection level of the network itself and the data that is

transmitted D) indicates how fast data is transmitted over the network E) indicates how well the network can accommodate more users or data

transmission requirements F) indicates the structure of the network G) indicates the general price of components, installation, and maintenance of the

network

Q8) Which statement about physical networking topologies is accurate? (Source: Exploring the Functions of Networking) A) A physical topology defines the way in which the computers, printers, network

devices, and other devices are connected. B) There are two primary categories of physical topologies: bus and star. C) A physical topology describes the paths that signals travel from one point on a

network to another. D) The choice of a physical topology is largely influenced by the type of data to

be transmitted over the network.

Q9) Which statement about logical topologies is accurate? (Source: Exploring the Functions of Networking) A) A logical topology defines the way in which the computers, printers, network

devices, and other devices are connected. B) A logical topology depends solely on the type of computers to be included in

the network. C) A logical topology describes the paths that the signals travel from one point on

a network to another. D) A network cannot have different logical and physical topologies.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 199: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Building a Simple Network 1-177

Q10) Match each topology type to its correct description. (Source: Exploring the Functions of Networking)

_____ 1. All of the network devices connect directly to each other in a linear fashion.

_____ 2. All of the network devices are directly connected to one central point with no other connections between them.

_____ 3. All of the devices on a network are connected in the form of a circle.

_____ 4. Each device has a connection to all of the other devices.

_____ 5. At least one device maintains multiple connections to other devices.

_____ 6. This design adds redundancy to the network. A) star B) bus C) mesh D) ring E) partial-mesh F) dual-ring

Q11) Which two statements about wireless networks are accurate? (Choose two.) (Source: Exploring the Functions of Networking) A) Instead of cables, wireless communication uses RF or infrared waves to

transmit data. B) To receive the signals from the access point, a computer needs to have a

wireless adapter card or wireless NIC. C) For wireless LANs, a key component is a router, which propagates signal

distribution. D) Wireless networks are not very common, and generally only large corporations

use them.

Q12) What is the main threat to a closed network? (Source: Securing the Network) A) a deliberate attack from outside B) a deliberate or accidental attack from inside C) misuse by customers D) misuse by employees

Q13) Which two factors have recently influenced the increase in threats from hackers? (Choose two.) (Source: Securing the Network) A) Hacker tools require more technical knowledge to use. B) Hacker tools have become more sophisticated. C) The number of reported security threats has remained constant year to year. D) Hacker tools require less technical knowledge to use.

Q14) Which of the following four attacks is classified as an access attack? (Source: Securing the Network) A) password attacks B) DDoS C) Trojan horse D) Love Bug

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 200: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

1-178 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

Q15) Which two statements about the purpose of the OSI model are accurate? (Choose two.) (Source: Understanding the Host-to-host Communications Model) A) The OSI model defines the network functions that occur at each layer. B) The OSI model facilitates an understanding of how information travels

throughout a network. C) The OSI model ensures reliable data delivery through its layered approach. D) The OSI model allows changes in one layer to affect the other layers.

Q16) Match each OSI layer to its function. (Source: Understanding the Host-to-Host Communications Model)

_____ 1. physical

_____ 2. data link

_____ 3. network

_____ 4. transport

_____ 5. session

_____ 6. presentation

_____ 7. application A) provides connectivity and path selection between two host systems that may be

located on geographically separated networks B) ensures that the information sent at the application layer of one system is

readable by the application layer of another system C) defines how data is formatted for transmission and how access to the network

is controlled D) segments data from the system of the sending host and reassembles the data

into a data stream on the system of the receiving host E) defines the electrical, mechanical, procedural, and functional specifications for

activating, maintaining, and deactivating the physical link between end systems F) provides network services to the applications of the user, such as e-mail, file

transfer, and terminal emulation G) establishes, manages, and terminates sessions between two communicating

hosts and also synchronizes dialogue between the presentation layers of the two hosts and manages their data exchange

Q17) Arrange the steps of the data encapsulation process in the correct order. (Source: Understanding the Host-to-host Communications Model)

_____ 1. Step 1

_____ 2. Step 2

_____ 3. Step 3

_____ 4. Step 4

_____ 5. Step 5

_____ 6. Step 6

_____ 7. Step 7

_____ 8. Step 8

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 201: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Building a Simple Network 1-179

A) The presentation layer adds the presentation layer header (Layer 6 header) to the data. This then becomes the data that is passed down to the session layer.

B) The session layer adds the session layer header (Layer 5 header) to the data. This then becomes the data that is passed down to the transport layer.

C) The application layer adds the application layer header (Layer 7 header) to the user data. The Layer 7 header and the original user data become the data that is passed down to the presentation layer.

D) The network layer adds the network layer header (Layer 3 header) to the data. This then becomes the data that is passed down to the data link layer.

E) The transport layer adds the transport layer header (Layer 4 header) to the data. This then becomes the data that is passed down to the network layer.

F) The user data is sent from an application to the application layer. G) The data link layer adds the data link layer header and trailer (Layer 2 header

and trailer) to the data. A Layer 2 trailer is usually the frame check sequence, which is used by the receiver to detect whether the data is in error. This then becomes the data that is passed down to the physical layer.

H) The physical layer then transmits the bits onto the network media.

Q18) At which layer does de-encapsulation first occur? (Source: Understanding the Host-to-Host Communications Model) A) application B) data link C) network D) transport

Q19) Match each layer with the function it performs in peer-to-peer communication. (Source: Understanding the Host-to-Host Communications Model)

_____ 1. network layer

_____ 2. data link layer

_____ 3. physical layer A) encapsulates the network layer packet in a frame B) moves the data through the internetwork by encapsulating the data and

attaching a header to create a packet C) encodes the data-link frame into a pattern of 1s and 0s (bits) for transmission

on the medium (usually a wire)

Q20) What is the function of a network protocol? (Source: Understanding the Host-to-Host Communications Model) A) uses sets of rules that tell the services of a network what to do B) ensures reliable delivery of data C) routes data to its destination in the most efficient manner D) is a set of functions that determine how data is defined

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 202: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

1-180 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

Q21) Match each TCP/IP stack layer to its function. (Source: Understanding the Host-to-Host Communications Model)

_____ 1. provides applications for file transfer, network troubleshooting, and Internet activities, and supports the network

_____ 2. defines how data is formatted for transmission and how access to the network is controlled

_____ 3. defines the electrical, mechanical, procedural, and functional specifications for activating, maintaining, and deactivating the physical link between end systems

_____ 4. provides routing of data from the source to a destination by defining the packet and addressing scheme, moving data between the data link and transport layers, routing packets of data to remote hosts, and performing fragmentation and reassembly of data packets

_____ 5. provides communication services directly to the application processes running on different network hosts

A) physical layer B) data link layer C) Internet layer D) transport layer E) application layer

Q22) Which area of the OSI model and the TCP/IP stack is most diverse? (Source: Understanding the Host-to-Host Communications Model) A) network layer B) transport layer C) application layer D) data link layer

Q23) How many bits are in an IPv4 address? (Source: Understanding the TCP/IP Internet Layer) A) 16 B) 32 C) 48 D) 64 E) 128

Q24) In a Class B address, which of the octets are the host address portion and are assigned locally? (Source: Understanding the TCP/IP Internet Layer) A) The first octet is assigned locally. B) The first and second octets are assigned locally. C) The second and third octets are assigned locally. D) The third and fourth octets are assigned locally.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 203: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Building a Simple Network 1-181

Q25) The address 172.16.128.17 is of which class? (Source: Understanding the TCP/IP Internet Layer) A) Class A B) Class B C) Class C D) Class D

Q26) Which of the following statements is true of a directed-broadcast address? (Source: Understanding the TCP/IP Internet Layer) A) A broadcast address is an address that has all 0s in the host field. B) Any IP address in a network can be used as a broadcast address. C) A directed broadcast address is an address that has all 1s in the host field. D) None of the above is correct.

Q27) Which two of these addresses are private IP addresses? (Choose two.) (Source: Understanding the TCP/IP Internet Layer) A) 10.215.34.124 B) 127.16.71.43 C) 172.17.10.10 D) 225.200.15.10

Q28) Which three statements about IP are accurate? (Choose three.) (Source: Understanding the TCP/IP Internet Layer) A) IP is a connectionless protocol. B) IP uses relational addressing. C) IP delivers data reliably. D) IP operates at Layer 2 of the TCP/IP stack and OSI model. E) IP does not provide any recovery functions. F) IP delivers data on a best-effort basis.

Q29) Which three statements about TCP are accurate? (Choose three.) (Source: Understanding the TCP/IP Transport Layer) A) TCP operates at Layer 3 of the TCP/IP stack. B) TCP is a connection-oriented protocol. C) TCP provides no error checking. D) TCP packets are numbered and sequenced so that the destination can reorder

packets and determine if a packet is missing. E) TCP provides no recovery service. F) Upon receipt of one or more TCP packets, the receiver returns an

acknowledgment to the sender indicating that it received the packets.

Q30) Which characteristic is similar between TCP and UDP? (Source: Understanding the TCP/IP Transport Layer) A) operates at Layer 4 (transport layer) of the OSI model and the TCP/IP stack B) capable of performing a very limited form of error checking C) provides service on a best-effort basis and does not guarantee packet delivery D) provides no special features that recover lost or corrupted packets

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 204: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

1-182 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

Q31) When a single computer with one IP address has several websites open at once, this is called _____. (Source: Understanding the TCP/IP Transport Layer) A) windowing B) session multiplexing C) segmenting D) connection-oriented protocol

Q32) TCP is best for which two of the following applications? (Choose two.) (Understanding the TCP/IP Transport Layer) A) e-mail B) voice streaming C) downloading D) video streaming

Q33) Which three of the following characteristics apply to UDP? (Choose three.) (Source: Understanding the TCP/IP Transport Layer) A) Packets are treated independently. B) Packet delivery is guaranteed. C) Packet delivery is not guaranteed. D) Lost or corrupted packets are not resent.

Q34) Which two of the following characteristics apply to TCP? (Choose two.) (Source: Understanding the TCP/IP Transport Layer) A) Packet delivery is not guaranteed. B) Lost or corrupted packets are not resent. C) Lost or corrupted packets are resent. D) TCP segment contains a sequence number and an acknowledgment number.

Q35) Proprietary applications use which kind of port? (Source: Understanding the TCP/IP Transport Layer) A) dynamically assigned ports B) well-known ports C) registered ports

Q36) Ports that are used only for the duration of a specific session are called _____. (Source: Understanding the TCP/IP Transport Layer) A) dynamically assigned ports B) well-known ports C) registered ports

Q37) The source port in both a UDP header and a TCP header is a _____. (Source: Understanding the TCP/IP Transport Layer) A) 16-bit number of the called port B) 16-bit length of the header C) 16-bit sum of the header and data fields D) 16-bit number of the calling port

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 205: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Building a Simple Network 1-183

Q38) Which field in a TCP header ensures that data arrives in correct order? (Source: Understanding the TCP/IP Transport Layer) A) acknowledgment number B) sequence number C) reserved D) options

Q39) In a TCP connection setup, the initiating device sends which message? (Source: Understanding the TCP/IP Transport Layer) A) ACK B) receive SYN C) send SYN

Q40) Acknowledgment and windowing are two forms of _____. (Source: Understanding the TCP/IP Transport Layer) A) flow control B) TCP connection C) TCP sequencing D) reliable connections

Q41) Windowing provides which of the following services? (Source: Understanding the TCP/IP Transport Layer) A) The sender can multiplex. B) The receiver can have outstanding acknowledgments. C) The receiver can multiplex. D) The sender can transmit a specified number of unacknowledged segments.

Q42) Sequence numbers and acknowledgment numbers are found where? (Source: Understanding the TCP/IP Transport Layer) A) UDP header B) TCP header C) initial sequence number D) application layer

Q43) What organization is responsible for Ethernet standards? (Source: Understanding Ethernet) A) ISO B) IEEE C) EIA D) IEC

Q44) What are three characteristics of Ethernet 802.3? (Choose three.) (Source: Understanding Ethernet) A) based on the CSMA/CD process B) is a standard that has been replaced by Ethernet II C) specifies the physical layer (Layer 1) D) developed in the mid-1970s E) specifies the MAC portion of the data link layer (Layer 2) F) also referred to as thick Ethernet

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 206: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

1-184 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

Q45) Which statement about an Ethernet address is accurate? (Source: Understanding Ethernet) A) The address used in an Ethernet LAN directs data to the proper receiving

location. B) The source address is the 4-byte hexadecimal address of the NIC on the

computer that is generating the data packet. C) The destination address is the 8-byte hexadecimal address of the NIC on the

LAN to which a data packet is being sent. D) Both the destination and source addresses consist of an 8-byte hexadecimal

number.

Q46) Which statement about MAC addresses is accurate? (Source: Understanding Ethernet) A) A MAC address is a number in hexadecimal format that is physically located

on the NIC. B) A MAC address is represented by hexadecimal digits that are organized in

pairs. C) It is not necessary for a device to have a unique MAC address to participate in

the network. D) The MAC address can never be changed.

Q47) Which statement about NICs is accurate? (Source: Connecting to an Ethernet LAN) A) The NIC plugs into a USB port and provides a port for connecting to the

network. B) The NIC communicates with the network through a serial connection and

communicates with the computer through a parallel connection. C) The NIC communicates with the network through a parallel connection and

communicates with the computer through a serial connection. D) An NIC is also referred to as a switch adapter.

Q48) Which minimum category of UTP is required for Ethernet 1000BASE-T? (Source: Connecting to an Ethernet LAN) A) Category 3 B) Category 4 C) Category 5 D) Category 5e

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 207: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Building a Simple Network 1-185

Q49) Match the UTP categories to the environments in which they are most commonly used. (Source: Connecting to an Ethernet LAN)

_____ 1. Category 1

_____ 2. Category 2

_____ 3. Category 3

_____ 4. Category 4

_____ 5. Category 5

_____ 6. Category 5e

_____ 7. Category 6 A) capable of transmitting data at speeds up to 100 Mb/s B) used in networks running at speeds up to 1000 Mb/s (1 Gb/s) C) consists of four pairs of 24-gauge copper wires, which can transmit data at

speeds up to 1000 Mb/s D) used for telephone communications; not suitable for transmitting data E) used in Token Ring networks; can transmit data at speeds up to 16 Mb/s F) capable of transmitting data at speeds up to 4 Mb/s G) used in 10BASE-T networks; can transmit data at speeds up to 10 Mb/s

Q50) Which three characteristics pertain to UTP? (Choose three.) (Source: Connecting to an Ethernet LAN) A) UTP cable is an eight-pair wire. B) An insulating material covers each of the individual copper wires in UTP

cable. C) The wires in each pair are wrapped around each other. D) There is limited signal degradation from EMI and RFI. E) There are seven categories of UTP cable.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 208: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

1-186 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

Module Self-Check Answer Key Q1) A, B, C

Q2) A

Q3) D

Q4) C

Q5) A

Q6) A, B, D

Q7) 1 = D, 2 = G, 3 = C, 4 = A, 5 = E, 6 = B, 7 = F

Q8) A

Q9) C

Q10) 1 = B , 2 = A , 3 = D, 4 = C, 5 = E , 6 = F

Q11) A, B

Q12) B

Q13) B, D

Q14) A

Q15) A, B

Q16) 1 = E, 2 = C, 3 = A, 4 = D, 5 = G, 6 = B, 7 = F

Q17) 1 = F, 2 = C, 3 = A, 4 = B, 5 = E, 7 = D, 7 = G, 8 = H

Q18) B

Q19) 1 = B, 2 = A, 3 = C

Q20) A

Q21) 1 = E, 2 = B, 3 = A, 4 = C, 5 = D

Q22) D

Q23) B

Q24) D

Q25) B

Q26) C

Q27) B, C

Q28) A, E, F

Q29) B, D, F

Q30) A

Q31) B

Q32) A, C

Q33) A, C, D

Q34) C, D

Q35) C

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 209: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Building a Simple Network 1-187

Q36) A

Q37) D

Q38) B

Q39) C

Q40) A

Q41) D

Q42) B

Q43) B

Q44) A, D, E

Q45) D

Q46) A

Q47) B

Q48) D

Q49) 1 = D, 2 = F, 3 = G, 4 = E, 5 = A, 6 = B, 7 = C

Q50) B, C, E

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 210: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

1-188 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 211: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

Module 2

Ethernet LANs

Overview This module describes the various types of LAN topologies, details the challenges of shared LANs and how those challenges are solved with switched LAN technology, and describes ways in which LANs can be optimized.

Module Objectives Upon completing this module, you will be able to expand an Ethernet LAN by adding a hub. This ability includes being able to meet these objectives:

Describe issues related to increasing traffic on an Ethernet LAN

Identify switched LAN technology solutions to Ethernet networking issues

Describe the host-to-host packet delivery process through a switch

Describe the features and functions of the Cisco IOS software CLI

Start an access layer switch and use the CLI to configure and to monitor the switch

Enable physical, access, and port level security on a switch

List the ways in which an Ethernet LAN can be optimized

Describe methods of troubleshooting switch issues

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 212: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

2-2 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 213: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

Lesson 1

Understanding the Challenges of Shared LANs

Overview LANs are a relatively low-cost means of sharing expensive resources. LANs allow multiple users in a relatively small geographic area to exchange files and messages and to access shared resources such as file servers. LANs have rapidly evolved into support systems that are critical to communications within an organization. This lesson describes the challenges that shared LANs face as they confront the increasing need for bandwidth and speed to satisfy the needs of multiple users.

Objectives Upon completing this lesson, you will be able to identify issues related to increasing traffic on an Ethernet LAN. This ability includes being able to meet these objectives:

Define Ethernet LAN segments and their distance limitations

List the characteristics and functions of a hub in an Ethernet LAN

Define collisions on a LAN and list the conditions that produce them

Define collision domains in an Ethernet LAN

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 214: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

2-4 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

Ethernet LAN Segments Segment length is an important consideration when using Ethernet technology in a LAN. This topic describes segments and their limitations.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-2

Signals degrade with transmission distance.Each Ethernet type has a maximum segment length.

LAN Segment Limitations

A segment is a network connection made by a single unbroken network cable. Ethernet cables and segments can span only a limited physical distance, beyond which transmissions will become degraded because of line noise, reduced signal strength, and failure to follow the Carrier Sense Multiple Access with Collision Detection (CSMA/CD) specifications for collision detection. Cable type, data rate, and modulation technique affect the maximum segment length.

Any device that operates at Layer 1 of the Open Systems Interconnection (OSI) model will not terminate the Ethernet segment of the LAN, because Layer 1 devices only repeat the electrical signals.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 215: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Ethernet LANs 2-5

Each type of Ethernet specification has a defined set of cable type, data rate, and modulation technique, which in turn define a maximum segment length, as shown in the table.

Here are guidelines, using 10BASE-T (Ethernet over twisted pair) as an example: .

The 10 refers to the speed supported, in this case 10 Mb/s.

Base means it is baseband Ethernet.

The T means twisted-pair, Category 5 or above.

FL means over fiber-optic cable.

Ethernet Segment Distance Limitations

Ethernet Specification

Description Segment Length

10BASE-T 10-Mb/s Ethernet over twisted pair

100 m

10BASE-FL 10-Mb/s Ethernet over fiber-optic cable

2000 m

100BASE-TX 100-Mb/s Ethernet over twisted pair

100 m

100BASE-FX Fast Ethernet over fiber-optic cable

400 m

1000BASE-T Gigabit Ethernet over twisted pair 100 m

1000BASE-LX Gigabit Ethernet over fiber-optic cable

550 m if 62.5-micron (µ or 50-µ multimode fiber; 10 km if 10-µ single-mode fiber)

1000BASE-SX Gigabit Ethernet over fiber-optic cable

250 m if 62.5-µ multimode fiber; 550 m if 50-µ multimode fiber

1000BASE-CX Gigabit Ethernet over copper cabling

25 m

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 216: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

2-6 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

Extending a LAN Segment You can add devices to an Ethernet LAN to extend segments. This topic describes how adding repeaters or hubs can overcome the distance limitation in an Ethernet LAN.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-3

Extending LAN Segments

Shares bandwidthExtends cable distancesRepeats or amplifies signal

A repeater is a physical-layer device that takes a signal from a device on the network and acts as an amplifier. Adding repeaters to a network extends the segments of the network so data can be communicated successfully over longer distances. There are, however, limits on the number of repeaters that can be added to a network.

A hub, which also operates at the physical layer, is similar to a repeater. When a hub receives a transmission signal, it amplifies the signal and retransmits it. Unlike a repeater, however, a hub can have multiple ports to connect to a number of network devices; therefore, a hub retransmits the signal to every port to which a workstation or server is connected. Hubs do not read any of the data passing through them, and they are not aware of the source or destination of the frame. Essentially, a hub simply receives incoming bits, amplifies the electrical signal, and transmits these bits through all of its ports to the other devices on the network.

A hub extends, but does not terminate, an Ethernet LAN. The bandwidth limitation of a shared technology remains. Although each device has its own cable that connects into the hub, all users of a given Ethernet segment compete for the same amount of bandwidth.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 217: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Ethernet LANs 2-7

Collisions Collisions are part of the operation of Ethernet, occurring when two stations attempt to communicate at the same time. This topic describes how collisions occur on LANs.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-4

Collisions

Collisions are byproducts of the CSMA/CD method used by Ethernet. In an Ethernet network, many devices share the same segment. Despite listening to see if the media is free, stations may transmit simultaneously. If two or more stations on a shared media transmit at the same time, a collision results and the frames are destroyed. When the sending stations recognize the collision event, they will transmit a special “jam” signal for a predetermined time so the devices on the segment will know that the frame has been corrupted and stop communicating. The sending stations will then begin a random timer that must be completed before attempting to retransmit the data.

As networks become larger and use more bandwidth, it becomes more likely that stations will attempt to transmit data simultaneously and collisions will occur. The more collisions that occur, the worse the congestion becomes, and network accessibility can become slow or nonexistent.

Adding a hub to an Ethernet LAN can overcome the limits of the distance a frame can travel on a segment before the signal degrades, but hubs cannot improve collision issues.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 218: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

2-8 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

Collision Domains In expanding an Ethernet LAN to accommodate more users with more bandwidth requirements, you can create separate physical network segments, called collision domains, so collisions are limited to a domain rather than the entire network. This topic describes collision domains.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-5

Multiple Collision Domains

In traditional Ethernet segments, the network devices compete for the same bandwidth, with only one device being able to transmit data at a time. The network segments that share the same bandwidth are known as collision domains, because when two or more devices within that segment try to communicate at the same time, collisions may occur.

It is possible, however, to use other network devices operating at Layer 2 and above of the OSI model to divide a network into segments and reduce the number of devices that are competing for bandwidth. Each new segment, then, results in a new collision domain. More bandwidth is available to the devices on a segment, and collisions in one collision domain do not interfere with the working of the other segments.

The broadcast domain is another key concept. The filtering of frames based on their Media Access Control (MAC) addresses done by switches does not extend to filtering broadcast frames. By their very nature, broadcast frames must be forwarded; therefore, a collection of interconnected switches forms a single broadcast domain. It takes a Layer 3 entity, such as a router, to terminate a Layer 2 broadcast domain.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 219: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Ethernet LANs 2-9

Summary This topic summarizes the key points that were discussed in this lesson.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-6

Summary

A segment is a network connection made by a single unbroken network cable. Ethernet cables and segments can span only a limited physical distance, after which transmissions become degraded.A hub extends network segments by receiving incoming bits, amplifying the electrical signal, and transmitting these bits through all of its ports to the other devices on the network.If two or more stations on a segment transmit at the same time, a collision results.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-7

Summary (Cont.)

The network segments that share the same bandwidth are called collision domains because when two or more devices communicate at the same time, collisions may occur within that segment.It is possible to use other network devices operating at Layer 2(or above) of the OSI model to divide network segments to reducethe number of devices that are competing for bandwidth on a given segment and to provide more bandwidth to the devices in the segment.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 220: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

2-10 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 221: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

Lesson 2

Solving Network Challenges with Switched LAN Technology

Overview As LANs become increasingly congested and overburdened, several factors have combined to stress their capabilities. Modern PC processors are easily over 5,000 MIPS and the newest are over 50,000 MIPS. Faster processors increase demands for network resources. All of this network demand requires faster interconnections and presents a number of challenges. Switching technology offers a solution to these challenges. The addition of bridges and switches to networks can provide a means to maximize the speed and efficiency of LANs by reducing congestion and increasing bandwidth. This lesson describes how switching technology contributes to the efficiency of a LAN.

Objectives Upon completing this lesson, you will be able to identify switched LAN technology solutions to Ethernet networking issues. This ability includes being able to meet these objectives:

Identify the typical causes of network congestion on an Ethernet LAN

List the characteristics and functions of a bridge in alleviating network congestion

List the characteristics and functions of a switch

Compare the network performance of a switch to the network performance of a bridge

List the three functions of a switch

Describe how switching works

Describe how LANs today use switching technology

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 222: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

2-12 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

Typical Causes of Network Congestion Like a rapidly growing city experiencing traffic problems, networks experience congestion problems as they grow. This topic describes the most common causes of network congestion.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-2

Network Congestion

High-performance PCs More networked dataBandwidth-intensive applications

The most common causes of network congestion are as follows:

Increasingly powerful computer and network technologies: Today, CPUs, buses, and peripherals are much faster and more powerful than those used in early LANs, therefore they can send more data at higher rates through the network.

Increasing volume of network traffic: Network traffic is now more common, as remote resources are necessary to carry out basic work. Additionally, broadcast messages can adversely affect end-station and network performance, although TCP/IP is not a high user of broadcasts in general.

High-bandwidth applications: Software applications are becoming richer in their functionality and are requiring more and more bandwidth to process. Desktop publishing, engineering design, video on demand (VoD), electronic learning (e-learning), and streaming video—all of these applications require considerable processing power and speed. This puts a large burden on networks to manage the transmission of their files and requires sharing of the applications among users.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 223: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Ethernet LANs 2-13

Bridges—Early Solutions to Network Congestion Segmenting at Layer 2 of the Open Systems Interconnection (OSI) model can reduce congestion, and bridges were an early means to do this. This topic describes how bridges alleviate network congestion.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-3

Bridges

Operate at Layer 2 of the OSI modelForward, filter, or flood framesHave few portsAre slow

Ethernet bridges are used to divide a single Ethernet LAN into multiple segments. This arrangement increases the number of collision domains, thereby reducing network congestion.

Some of the most important characteristics of bridges are as follows:

Bridges operate at Layer 2 of the OSI model.

Bridges are more “intelligent” than hubs; bridges can analyze incoming frames and forward (or drop) them based on specific address information.

Bridges can buffer frames between two or more LAN segments.

Bridges create more collision domains, allowing more than one device to transmit simultaneously without causing a collision.

Bridges maintain MAC address tables.

Adding bridges to a network provides a number of benefits, including the following:

Isolating potential network problems to specific segments

Minimizing unnecessary network traffic by filtering data frames within or between LAN segments

Extending a LAN to cover greater distances by joining multiple segments

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 224: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

2-14 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

Switches While similar in some ways to bridges, LAN switches have special characteristics that make them effective in alleviating network congestion. This topic describes the characteristics of switches.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-4

LAN Switch

High port densityLarge frame buffersMixture of port speedsFast internal switchingSwitching modes:– Cut-through– Store-and-forward– Fragment-free

Like bridges, switches connect LAN segments, use a table of MAC addresses to determine the segment to which the data is to be sent, and reduce network traffic. Switches, however, operate at much higher speeds than bridges and support more advanced functionality, as follows:

High port density: Compared to bridges, switches have high port densities. 24-port and 48-port switches are quite common, with speeds of 10 Mb/s and 100 Mb/s. Large enterprise switches may support hundreds of ports.

Large frame buffers: The ability to store more received frames before having to drop them is useful, particularly when there may be congested ports to servers or other parts of the network.

Port speeds: Depending on the cost of a switch, it may be possible to support a mixture of media rates. Ports of 10 Mb/s and 100 Mb/s are expected, but 1-Gb/s or 10-Gb/s ports allow more flexibility.

Fast internal switching: Having fast internal switching allows the support of many ports at 10 Mb/s, 100 Mb/s, and 1000 Mb/s. The method used may be a fast internal bus or shared memory, which affects the overall performance of the switch.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 225: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Ethernet LANs 2-15

Switches use one of the following two forwarding methods for switching data between network ports:

Cut-through switching: In this method, the switch acts upon the data as soon as it is received, even if the transmission is not complete. The switch determines which port to forward the data to, and starts the process without buffering the data, basing the decision on the first frame that it receives. This is the faster of the two methods, but there is no error-checking to ensure the accuracy of the data. A variant of cut-through switching is fragment-free switching, in which the frame is not forwarded until there is no possibility of a collision occurring.

Store-and-forward switching: In this method, when the switch receives the data, it stores the data in buffers until the complete frame is received. During the storage process, the switch analyzes the frame for information about its destination. In this process, the switch also performs an error check.

Fragment-free switching: Cut-through switching provides low latency. However, it is subject to forwarding bad frames. The switch must start forwarding the frame before the switch can ensure that a collision has not occurred. Fragment-free switching will ensure that enough bytes are read from the source to detect a collision before forwarding.

Fragment-free switching can be thought of as a compromise between the high latency / high integrity of store and forward, and the low latency / reduced integrity of cut through switching. In practice, the difference between using cut-through and store-and-forward methods has turned out not to be important, because the marginal reduction in latency by cut-through switching has been offset by the low jitter (variability in latency) of store-and-forward switching.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 226: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

2-16 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

Switches vs. Bridges While similar in some ways to bridges, LAN switches have special characteristics that make them effective in alleviating network congestion by increasing effective network bandwidth. This topic describes the similarities and differences between switches and bridges.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-5

LAN Switch Features

The similarities between bridges and switches are as follows:

Both bridges and switches connect LAN segments.

Both bridges and switches use a table of MAC addresses to identify the segment to which a data frame should be sent.

Both bridges and switches help to reduce network traffic.

However, switches provide the following important functions, resulting in even greater benefits for eliminating network congestion:

Dedicated communication between devices: This increases frame throughput. Switches with one user per port have microsegmented the network. In this type of configuration, each user receives access to the full bandwidth and does not have to contend for available bandwidth with other users. As a result, collisions do not occur.

Multiple simultaneous conversations: Multiple simultaneous conversations can occur by forwarding, or switching, several packets at the same time, thereby increasing network capacity by the number of conversations supported. For example, when frames are being forwarded between ports 1 and 2, another conversation can be happening between ports 5 and 6. This is possible because of I/O buffers and fast internal transfer between ports. A switch that can support all combinations of possible frame transfers between all ports simultaneously is said to offer wire-speed and nonblocking performance. Of course, this class of switch is relatively expensive.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 227: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Ethernet LANs 2-17

Full-duplex communication: After a connection is microsegmented, it has only two hosts (the switch and the host). It is now possible to configure the ports so they can both receive and send data at the same time, which is called full-duplex communication. For example, point-to-point 100-Mb/s connections have 100 Mb/s of transmission capacity and 100 Mb/s of receiving capacity, for an effective 200-Mb/s capacity on a single connection. The configuration between half-duplex and full-duplex is automatically negotiated at the time the link connection is established. (Half-duplex means that there is transmission of data in just one direction at a time).

Media-rate adaptation: A LAN switch that has ports with different media rates can adapt to between 10 and 100 Mb/s, or 100 and 1000 Mb/s, allowing bandwidth to be matched as needed. Without this ability, it would not be possible to have different media-rate ports operating at the same time.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 228: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

2-18 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

How Switches Segment the Ethernet Network Switches have superseded bridges. Switches perform three major functions in segmenting an Ethernet network: forwarding, filtering, and flooding. This topic describes the major functions of switches.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-6

Switches Supersede Bridges

Operate at Layer 2 of the OSI modelForward, filter, or flood framesHave many portsAre fast

Switches build a table of learned MAC addresses, which are associated with the port on which they can be reached. Switches then use these MAC addresses as they decide whether to filter, forward, or flood frames.

The table shows how switches process unicast frames.

How Switches Process Unicast Frames on an Ethernet LAN

Step Action

1. When a unicast frame is received on a port, the switch compares the destination MAC address to the MAC addresses contained in its tables.

2. If the switch determines that the destination MAC address of the frame resides on the same network segment as the source, it does not forward the frame. This process is called filtering, and by performing this process, switches can significantly reduce the amount of traffic going between network segments by eliminating the unnecessary frames.

3. If the switch determines that the destination MAC address of the frame is not from the same network segment as the source, it forwards the frame to the appropriate segment.

4. If the switch does not have an entry for the destination address, it will transmit the frame out all ports except the port on which it received the frame. This process is called flooding.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 229: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Ethernet LANs 2-19

Switching in Action A switch determines how to handle a data frame by using its MAC address table. This topic describes the process by which data frames are transmitted via a switch using MAC addresses.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-7

Switching Frames

When an address is not known, a switch learns the network topology by analyzing the source address of incoming frames from all attached networks. The table describes this process.

Switching Frames Procedure

Step Action

1. The switch receives a broadcast frame from PC A on port 1.

2. The switch enters the source MAC address and the switch port that received the frame into the MAC table.

3. Because the destination address is a broadcast, the switch floods the frame to all ports, except the port on which it received the frame.

4. The destination device replies to the broadcast with a unicast frame addressed to PC A.

5. The switch enters the source MAC address of PC B and port number of the switch port that received the frame into the MAC table. The destination address of the frame and its associated port is found in the MAC table.

6. The switch can now forward frames between source and destination devices without flooding, because it has entries in the MAC table that identify the associated ports.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 230: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

2-20 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

LANs Using Switched Technology Switched networks are the most common types of LANs today. The per-port price of switches has decreased so much that hubs and bridges are no longer considered when making a purchasing decision. This topic describes how LANs today use switching technology.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-8

LANs Today

Users grouped by physical location More switches added to networksSwitches connected by high-speed links

In switched networks, how users are grouped is largely determined by their physical location. For example, all the users connected to a switch on the first floor of an office building will belong to the same workgroup, while all the users connected to a switch on the second floor will belong to a different workgroup. This type of arrangement allows each group to access the devices on the network, such as servers, with a reduced chance of collisions, maximizing the overall performance of the network.

To accommodate more users and higher demand for network resources and bandwidth, more and more switches are added to networks. With the addition of more switches on a network, however, the amount of data traffic between them increases; therefore, there is a need to ensure that the speed and performance of the communication paths between the switches and other network devices are also increased.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 231: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Ethernet LANs 2-21

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-9

VLAN = Broadcast Domain = Logical Network (Subnet)

VLAN Overview

Segmentation

Flexibility

Security

A VLAN is a logical broadcast domain that can span multiple physical LAN segments. Within the switched internetwork, VLANs provide segmentation and organizational flexibility. You can design a VLAN structure that allows you to group together stations that are segmented logically by functions, project teams, and applications without regard to the physical location of the users. You can assign each switch port to only one VLAN, thereby adding a layer of security. Ports in a VLAN share broadcasts; ports in different VLANs do not share broadcasts. Containing broadcasts within a VLAN improves the overall performance of the network.

Within the switched internetwork, VLANs provide segmentation and organizational flexibility. Using VLAN technology, you can group switch ports and their connected users into logically defined communities, such as coworkers in the same department, a cross-functional product team, or diverse user groups sharing the same network application.

A VLAN can exist on a single switch or span multiple switches. VLANs can include stations in a single building or multiple-building infrastructures. VLANs can also connect across WANs.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 232: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

2-22 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

Summary This topic summarizes the key points that were discussed in this lesson.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-10

Summary

The most common causes of network congestion on an Ethernet LAN are increasingly powerful computer and network technologies;increasing volume of network traffic; and high-bandwidth applications, such as desktop publishing, e-learning, and streaming videoEthernet bridges were used to divide an Ethernet LAN into multiple segments. This arrangement prevented devices connected to one segment from experiencing frame collisions with devices on another segment, and also reduced network congestionSwitches operate at much higher speeds than bridges, support high port density with large frame buffers, and provide faster internal switching. In addition, switches use one of two forwarding methods for switching data between network ports: cut-through switching or store-and-forward switching

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-11

Summary (Cont.)

Switches offer greater benefits for eliminating network congestion than bridges by providing dedicated communication between devices, multiple simultaneous conversations, full-duplex communication, and media-rate adaptationSwitches operate at Layer 2 of the OSI model, analyzing incomingframes and forwarding, filtering, or flooding them based on destination address information. Switches also collect and pass frames between two or more LAN segments, increasing the number of collision domainsSwitches build tables of known MAC addresses that are located on network segments and map them to associated ports. Switches then use the MAC addresses as they analyze frames

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 233: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Ethernet LANs 2-23

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-12

Summary (Cont.)

In switched networks, how users are grouped is largely determined by their physical location. Many switches are used toallow each group to access the devices on the network, such as servers. Switches need to be interconnected by high-speed ports to maximize the overall performance of the network

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 234: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

2-24 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 235: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

Lesson 3

Exploring the Packet Delivery Process

Overview The “Building a Simple Network” module addressed host-to-host communications and introduced switches. This lesson will provide a graphic representation of host-to-host communications when the data passes through a switch.

Objectives Upon completing this lesson, you will be able to describe how a host-to-host connection is made and maintained. This ability includes being able to meet these objectives:

Describe Layer 2 addressing

Describe Layer 3 addressing

Describe packet delivery (host to host)

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 236: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

2-26 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

Layer 2 Addressing Host-to-host communications requires Layer 2 addresses. This topic covers where the Layer 2 address fits into the host-to-host communications model.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-2

Layer 2 Addressing

Uses MAC addressAssigned to end devices

Recall from the “Building a Simple Network” module that MAC addresses are assigned to end devices such as hosts. In most cases, Layer 2 network devices like bridges and switches are not assigned a MAC address. However, there are some special cases where switches may be assigned an MAC address. These will be covered later in this course.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 237: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Ethernet LANs 2-27

Layer 3 Addressing This topic describes where Layer 3 addressing fits into the host-to-host communications model.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-3

Layer 3 Addressing

Each NOS has its own Layer 3 address format.OSI uses NSAP. TCP/IP uses IP.

Each network operating system (NOS) has its own Layer 3 address format. For example, the Open Systems Interconnection (OSI) model uses a network service access point (NSAP) while TCP/IP uses an IP address.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 238: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

2-28 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

Host-to-Host Packet Delivery This topic describes typical host-to-host communications.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-4

Host-to-Host Packet Delivery (1 of 10)

In this example host 192.168.3.1 has data that it wants to send to host 192.168.3.2. The application does not need a reliable connection. User Datagram Protocol (UDP) is selected.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 239: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Ethernet LANs 2-29

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-5

Host-to-Host Packet Delivery (2 of 10)

Because it is not necessary to set up a session, the application can start sending data. UDP pre-pends a UDP header and passes the protocol data unit (PDU) to IP (Layer 3) with instructions to send the PDU to 192.168.3.2. IP encapsulates the PDU in a Layer 3 packet and passes it to Layer 2.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-6

Host-to-Host Packet Delivery (3 of 10)

As with the example in the “Building a Simple Network” module, Address Resolution Protocol (ARP) does not have an entry in its table.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 240: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

2-30 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-7

Host-to-Host Packet Delivery (4 of 10)

Host 192.168.3.1 sends out the ARP request. However in this example it is received by the switch before it reaches the remote host.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 241: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Ethernet LANs 2-31

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-8

Host-to-Host Packet Delivery (5 of 10)

When the switch receives the frame it needs to forward it out the proper port. However, in this example neither the source nor the destination MAC addresses are in the switch’s MAC table. The switch can learn the port mapping for the source host from the MAC address in the frame, so the switch will add it to the port mapping table. (0800:0222:2222 = port 1).

Because the destination address is a broadcast, the switch has to flood the packet out all ports.

Note The switch does not change the frame in any way.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 242: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

2-32 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-9

Host-to-Host Packet Delivery (6 of 10)

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-10

Host-to-Host Packet Delivery (7 of 10)

The destination host receives the ARP request, then replies.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 243: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Ethernet LANs 2-33

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-11

Host-to-Host Packet Delivery (8 of 10)

The switch learns the port mapping for the source host from the MAC address in the frame. So the switch adds it to the port mapping table. (0800:0222:1111 = port 2).

Because the destination was previously added to the switch’s MAC table, the switch can forward the frame out port 1.

Note The switch does not change the frame in any way.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 244: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

2-34 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-12

Host-to-Host Packet Delivery (9 of 10)

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-13

Host-to-Host Packet Delivery (10 of 10)

The data is sent and received. All frames are passed through the switch unchanged.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 245: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Ethernet LANs 2-35

Summary This topic summarizes the key points that were discussed in this lesson.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-14

Summary

Layer 2 addresses are MAC addresses.Layer 3 addresses are IP addresses.If the MAC address is not known, ARP is used to map Layer 2 to Layer 3.Switches learn the MAC addressing to port mapping by monitoring the source addresses of frames.When a switch forwards a frame, it does not change the source or destination Layer 2 address.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 246: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

2-36 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 247: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

Lesson 4

Operating Cisco IOS Software

Overview Understanding the enterprise network environment provides a perspective on the need for greater functionality and control over network components, delivered through more sophisticated network devices such as switches. Cisco IOS Software is feature-rich network system software, providing network intelligence for business-critical solutions. This lesson compares the functionality of switches and devices in small office, home office (SOHO) network environments with network components in enterprise network environments, and describes Cisco IOS Software functions and operation.

Objectives Upon completing this lesson, you will be able to set up console connections between Cisco network devices and a terminal. This ability includes being able to meet these objectives:

List the features and functions of Cisco IOS Software in relation to enterprise network considerations

Describe the initial startup for Cisco network devices

Describe external configurations for Cisco network devices

Define the features of the Cisco IOS CLI

Describe how to start an EXEC session and change EXEC modes

Identify the online help functions associated with the device CLI

Describe the enhanced editing functions of the Cisco IOS CLI

Use the device command history feature of the CLI

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 248: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

2-38 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

Cisco IOS Software Features and Functions Cisco IOS Software is the industry-leading and is the most widely deployed network system software. This topic describes the features and functions of Cisco IOS Software.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-2

Cisco IOS Software

Features to carry the chosen network protocols and functionsConnectivity for high-speed traffic between devicesSecurity to control access and prohibit unauthorized network useScalability to add interfaces and capability as needed for network growthReliability to ensure dependable access to networked resources

The Cisco IOS Software platform is implemented on most Cisco hardware platforms, including switches and devices. It is the embedded software architecture in all Cisco devices and is also the operating system of Cisco Catalyst switches.

Cisco IOS Software enables the following network services in Cisco products:

Features to carry the chosen network protocols and functions

Connectivity allows high-speed traffic between devices

Security controls access and prohibits unauthorized network use

Scalability adds interfaces and capability as needed for network growth

Reliability ensures dependable access to networked resources

The Cisco IOS Software command-line interface (CLI) is accessed through a console connection, a modem connection, or a Telnet session. Regardless of which connection method is used, access to the Cisco IOS Software CLI is generally referred to as an EXEC session.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 249: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Ethernet LANs 2-39

Configuring Network Devices The Cisco IOS CLI is used to communicate the configuration details that implement the network requirements of an organization. This topic describes the initial steps for starting and configuring a Cisco network device.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-3

Configuring Network Devices

Initial default settings are sufficient for the switch to operate at Layer 2 as a switch.A Cisco device will prompt for initial configuration if there is no configuration in memory.Additional configuration tasks set up the device with the following:– Protocol addressing and parameter settings– Options for administration and management

When a Cisco IOS switch is started for the first time, its initial configuration with default settings is sufficient for it to operate at Layer 2 as a switch. When a Cisco router is started for the first time, however, the switch does not have sufficient information in its initial configuration to operate at Layer 3, as the switch management requires IP address information as a minimum, therefore the switch software will prompt for information using a dialog called setup.

The configuration sets up the device with the following information:

Protocol addressing and parameter settings, such as configuring the IP address and subnet mask on an interface

Options for administration and management, such as setting up passwords, and so on

In this lesson a minimal device configuration for a switch will be discussed. Changes to these minimal or default configurations to meet particular network requirements constitute many of the tasks of a network administrator.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 250: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

2-40 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-4

An Overview of Cisco Device Startup

When a Cisco device starts up, the following three main operations are performed on the networking device:

1. The device performs hardware-checking routines. A term often used to describe this initial set of routines is power-on self-test (POST).

2. After the hardware has been shown to be in good working order, the device performs system startup routines. These initiate the switch or device operating system software.

3. After the operating system is loaded, the device tries to find and apply software configuration settings that establish the details needed for network operation.

Typically, there is a sequence of fallback routines that provides software startup alternatives, if needed.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 251: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Ethernet LANs 2-41

External Configuration Sources A switch or device can be configured from sources that are external to the device. This topic describes the external configuration sources available to configure Cisco network devices.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-5

External Configuration Sources

Configurations can come from many sources.Configurations will act in device memory.

You can access a device from a remote location without being connected to the network, by dialing directly to the console or auxiliary port on the device. In general, the console port is recommended because it displays device startup messages, whereas the auxiliary port does not provide this information. A switch and a device can be configured from the following locations:

Console terminal: Upon initial installation, you can configure networking devices from the console terminal, which is connected via the console port. You will need the following items to configure a Cisco device from the console port:

— RJ-45-to-RJ-45 rollover cable

— Personal computer (PC) or equivalent with communications software configured with the following settings:

Speed: 9600 b/s

Data bits: 8

Parity: None

Stop bit: 1

Flow control: None

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 252: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

2-42 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

Remote terminal: To support a remote device, a modem connection to the auxiliary port of the device allows a remote device to be configured from a remote terminal. However, the auxiliary port of the device must first be configured for communication with the external modem. You will need the following items to connect remotely to the auxiliary port on a Cisco device:

— Straight-through serial cable

— 14.4-kb/s modem

— PC or equivalent with suitable communications software

After initial startup, you can access and configure the device in the following ways:

Establish a terminal session using Telnet.

Configure the device via the connection, or download a previously written configuration file from a Trivial File Transfer Protocol (TFTP) server on the network.

Download a configuration file using a network management software application such as CiscoWorks.

Note Not all network devices have all the ports shown in the figure. For example, some Cisco SOHO devices do not have an auxiliary port.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 253: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Ethernet LANs 2-43

Cisco IOS Command-Line Interface Functions Cisco IOS Software uses a CLI via the console as its traditional environment to enter commands. While Cisco IOS Software is a core technology that extends across many products, its operation details vary on different internetworking devices. This topic describes the functions of the Cisco IOS CLI.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-6

CLI is used to enter commands.Operations vary on different internetworking devices.Users type or paste entries in the console command modes.Command modes have distinctive prompts.Enter key instructs device to parse and execute the command.Two primary EXEC modes are user mode and privileged mode.

Cisco IOS User Interface Functions

To enter commands into the CLI, type or paste the entries within one of the several console command modes. Each command mode is indicated with a distinctive prompt. The Enter key instructs the device to parse and execute the command.

Cisco IOS Software uses a hierarchy of commands in its command-mode structure. Each command mode supports specific Cisco IOS commands related to a type of operation on the device.

As a security feature, Cisco IOS Software separates the EXEC sessions into the following two access levels:

User EXEC: Allows a person to access only a limited number of basic monitoring commands

Privileged EXEC: Allows a person to access all device commands, such as those used for configuration and management, and can be password-protected to allow only authorized users to access the device

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 254: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

2-44 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

Entering the EXEC Modes Cisco IOS Software supports two EXEC command modes: user and privileged. This topic describes how to start an EXEC session and change EXEC modes.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-7

There are two main EXEC modes for entering commands.

Cisco IOS Software EXEC Mode (User)

The procedure outlined in the table describes how to enable the EXEC modes on a Cisco switch or device.

Step Action Results and Notes

1. Log in to the device initially with a username and password (if login is configured). This brings the device to a user EXEC mode prompt.

A prompt appears, signifying the user EXEC mode. The right arrow (>) in the prompt indicates that the device or switch is at the user EXEC level.

hostname>

Enter exit to close the session from the user EXEC mode.

2. Enter the ? command at the user EXEC-level prompt to display command options available in the user EXEC mode.

The ? command in the privileged EXEC mode reveals many more command options than it does at the user EXEC level. This feature is referred to as context-sensitive help.

The user EXEC level does not contain any commands that might control the operation of the device or switch. For example, the user EXEC mode does not allow reloading or configuring of the device or switch.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 255: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Ethernet LANs 2-45

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-8

Cisco IOS Software EXEC Mode (Privileged)

Critical commands, such as those related to configuration and management, require that you be in the privileged EXEC mode.

To change to the privileged EXEC mode from the user EXEC mode, enter the enable command at the hostname> prompt. If an enable password or an enable secret password is configured, the switch or device will then prompt for that password.

When the correct enable password is entered, the switch or device prompt changes to hostname#, indicating that the user is now at the privileged EXEC level. Entering the ? command at the privileged EXEC level will reveal many more command options than those available at the user EXEC level.

To return to the user EXEC level, enter the disable command at the hostname# prompt.

Note For security reasons, a Cisco network device will not echo the password that is entered. However, if a network device is configured over a modem link or Telnet is used, the password is sent in cleartext. Telnet does not offer a method to secure packets.

Note Secure Shell Protocol (SSH), which runs on most Cisco devices, allows communication securely over insecure channels and provides strong authentication. Refer to Cisco IOS documentation to learn how to use SSH.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 256: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

2-46 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

Keyboard Help in the CLI Cisco devices use Cisco IOS Software with extensive command-line input help facilities, including context-sensitive help. This topic describes the CLI keyboard help that is available on Cisco devices.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-9

Switch Command-Line Help Facilities

The Cisco IOS CLI on Cisco devices offers the following types of help:

Word help: Enter the character sequence followed immediately by a question mark. Do not include a space before the question mark. The device will display a list of commands that start with the characters that you entered. For example, enter the sh? command to get a list of commands that begin with the character sequence sh.

Command syntax help: Enter the ? command to get command syntax help to see how to complete a command. Enter a question mark in place of a keyword or argument. Include a space before the question mark. The network device will then display a list of available command options, with <cr> standing for carriage return. For example, enter show ? to get a list of the command options supported by the show command.

Note Cisco devices and Cisco Catalyst switches have similar command-line help facilities. All of the help facilities mentioned in this section for devices also apply to the Catalyst switches, unless otherwise stated.

Special Ctrl and Escape key sequences reduce the need to re-enter entire command strings. Cisco IOS Software provides several commands and characters to recall or complete command entries from a history buffer that keeps the last several commands that you entered. These commands can be reused instead of re-entered, if appropriate.

Console error messages help identify problems with an incorrect command entry. Error messages that might be encountered while using the CLI are shown in the table.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 257: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Ethernet LANs 2-47

Error Message Meaning How to Get Help

% Ambiguous command: “show con”

You did not enter enough characters for your device to recognize the command.

Re-enter the command followed by a question mark (?), without a space between the command and the question mark.

The possible keywords that you can enter with the command are displayed.

% Incomplete command

You did not enter all the keywords or values required by this command.

Re-enter the command followed by a question mark (?), with a space between the command and the question mark.

% Invalid input detected at ‘^’ marker

You entered the command incorrectly. The caret (^) marks the point of the error.

Enter a question mark (?) to display all of the commands or parameters that are available.

The command history buffer stores the commands that have been most recently entered. To see these commands, enter the Cisco IOS show history command.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 258: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

2-48 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-10

Context-Sensitive Help

You can use context-sensitive help to determine the syntax of a particular command. For example, if the device clock needs to be set but the clock command syntax is not known, the context-sensitive help provides a means to check the syntax for setting the clock.

If the word “clock” is entered, but misspelled, the system performs a symbolic translation of the misspelled command as parsed by Cisco IOS Software. If no CLI command matches the string input, an error message is returned. If there is no Cisco IOS command that begins with the misspelled letters, the device will interpret the misspelled command as a host name and attempt to resolve the host name to an IP address, then try to Telnet to that host.

Context-sensitive help will supply the whole command even if you enter just the first part of the command, such as cl?.

If you enter the command clock, but an error message indicating that the command is incomplete is displayed, enter the question mark (?) command (preceded by a space) to determine what arguments are required for the command. In the clock? example, the help output shows that the keyword set is required after clock.

If you now enter the command clock set, but another error message appears indicating that the command is still incomplete, press the Ctrl-P (or Up Arrow) key to repeat the command entry. Then, add a space and enter the question mark (?) command to display a list of command arguments that are available at that point for the given command.

The example shows that after the last command recall, the administrator used the question mark (?) command to reveal the additional arguments, which involve entering the current time using hours, minutes, and seconds.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 259: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Ethernet LANs 2-49

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-11

Context-Sensitive Help (Cont.)

The figure continues to illustrate how to set the device clock.

If, after entering the current time, you still see the Cisco IOS Software error message indicating that the command entered is incomplete, recall the command, add a space, and enter the question mark (?) to display a list of command arguments that are available at that point for the given command. In the example, enter the day, month, and year using the correct syntax, then press the Return key to execute the command.

Syntax checking uses the caret symbol (^) as an error-location indicator. The caret symbol appears at the point in the command string where an incorrect command, keyword, or argument has been entered. The error-location indicator and interactive help system provide a way to find and correct syntax errors easily. In the clock example, the caret symbol (^) indicates that the month was entered incorrectly. The parser is expecting the month to be spelled out.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 260: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

2-50 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

Enhanced Editing Commands The Cisco IOS CLI includes an enhanced editing mode that provides a set of editing key functions. This topic describes the enhanced editing key functions.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-12

SwitchX>Shape the future of internetworking by creating unpreced

Shape the future of internetworking by creating unprecedented value for customers, employees, and partners.

Enhanced Editing Commands

Although the enhanced line editing mode is automatically enabled, you can disable it. It may be a good idea to disable enhanced line editing if there are scripts that do not interact well when enhanced line editing is enabled. Use the terminal editing EXEC command to turn on advanced line editing features and the terminal no editing EXEC command to disable advanced line editing features.

One of the advanced line editing features is to provide horizontal scrolling for commands that extend beyond a single line on the screen. When the cursor reaches the right margin, the command line shifts ten spaces to the left. The first ten characters of the line can no longer be seen, but you can scroll back to check the syntax at the beginning of the command.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 261: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Ethernet LANs 2-51

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-13

Enhanced Editing Commands (Cont.)

In the example shown in the figure, the command entry extends beyond one line. The dollar sign ($) indicates that the line has been scrolled to the left. To scroll back, press Ctrl-B or the Left Arrow key repeatedly until you are at the beginning of the command entry, or press Ctrl-A to return directly to the beginning of the line.

The key sequences indicated in the figure are shortcuts or hot keys provided by the CLI. Use these key sequences to move the cursor around on the command line for corrections or changes.

The table describes each of the shortcuts shown in the figure and some additional shortcuts for command-line editing and controlling command entry.

Command-Line Editing Key Sequence

Description

Ctrl-A Moves the cursor to the beginning of the command line.

Ctrl-E Moves the cursor to the end of the command line.

Esc-B Moves the cursor back one word.

Esc-F Moves the cursor forward one word.

Ctrl-B Moves the cursor back one character.

Ctrl-F Moves the cursor forward one character.

Ctrl-D Deletes a single character to the left of the cursor.

Backspace Removes one character to the left of the cursor.

Ctrl-R Redisplays the current command line.

Ctrl-U Erases a line.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 262: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

2-52 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

Command-Line Editing Key Sequence

Description

Ctrl-W Erases a word to the left of the cursor.

Ctrl-Z Ends configuration mode and returns to the EXEC prompt.

Tab Completes a partially entered command if enough characters have been entered to make it unambiguous.

Note The Escape key is not functional on all terminals.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 263: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Ethernet LANs 2-53

Command History The Cisco CLI provides a history or record of commands that have been entered. This feature, called the command history, is particularly useful in helping recall long or complex commands or entries. This topic describes the device command history feature.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-14

Router Command History

With the command history feature, you can complete the following tasks:

Display the contents of the command buffer.

Set the command history buffer size.

Recall previously entered commands stored in the history buffer. There is a buffer for the EXEC mode and another buffer for the configuration mode.

By default, command history is enabled and the system records the last ten command lines in its history buffer.

To change the number of command lines the system will record during the current terminal session only, use the terminal history user EXEC mode command.

To recall commands in the history buffer beginning with the most recent command, press Ctrl-P or the Up Arrow key. Repeat the key sequence to recall successively older commands.

To return to more recent commands in the history buffer after recalling older commands with Ctrl-P or the Up Arrow key, press Ctrl-N or the Down Arrow key. Repeat the key sequence to recall successively more recent commands.

On most computers, there are additional select and copy facilities available. Copy a previous command string, and then paste or insert it as the current command entry and press Return.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 264: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

2-54 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-15

Viewing the Configuration

A Cisco router has the following three primary types of memory:

RAM: Stores routing tables, fast switching cache, running configuration, and so on

NVRAM: Used for writable permanent storage of the startup configuration

Flash: Provides permanent storage of the Cisco IOS Software image, backup configurations, and any other files via memory cards

The show startup-config command displays the saved configuration in NVRAM. The show running-config command displays the configuration in RAM.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 265: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Ethernet LANs 2-55

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-16

Displays the current and saved configuration

show running-config and show startup-config Commands

The show running-config command displays the current running configuration in RAM.

The “Building configuration.…” output indicates that the running configuration is being built from the active configurations stored in RAM.

After the running configuration is built from RAM, the “Current configuration:” message appears, indicating that this is the current configuration running in RAM.

The first line of the show startup-config command output indicates the amount of NVRAM used to store the configuration; for example, “Using 1359 out of 32762 bytes” indicates that the total size of the NVRAM is 32,762 bytes and the current configuration stored in NVRAM takes up 1359 bytes.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 266: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

2-56 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

Summary This topic summarizes the key points that were discussed in this lesson.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-17

Summary

Cisco IOS software is the embedded software architecture in all Cisco IOS devices and is also the operating system of Catalyst switches. Its functions include carrying the chosen network protocols, connectivity, security, scalability, and reliability.A switch or IOS device can be configured from a local terminal connected to the console port or from a remote terminal connected via a modem connection to the auxiliary port.The CLI is used by network administrators to monitor and configure various Cisco IOS devices. CLI also offers a help facility to aid network administrators with the verification and configuration commands.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-18

Summary (Cont.)

The CLI supports two EXEC modes: user and privileged. The privileged EXEC mode provides more functionality than the user EXEC mode.The Cisco IOS devices uses Cisco IOS software with extensive command-line input help facilities, including context-sensitive help.The Cisco IOS CLI includes an enhanced editing mode that provides a set of editing key functions.The Cisco IOS devices CLI provides a history or record of commands that have been entered. This feature, called the command history, is particularly useful to help recall long or complex commands or entries.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 267: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

Lesson 5

Starting a Switch

Overview A Cisco Catalyst switch goes through its startup when the switch is turned on. When the startup is complete, the initial software settings can be configured. Recognizing that the switch startup has completed without error is the first step in deploying a Catalyst switch. The switch must start successfully and have a default configuration to operate on the network. This lesson describes how the switch starts up and how to verify its initial operation.

Objectives Upon completing this lesson, you will be able to start an access layer switch and use the command-line interface (CLI) to interact with Cisco IOS Software. This ability includes being able to meet these objectives:

Start up a Cisco IOS switch

Identify the conditions reflected by the LEDs on Cisco IOS switches

Describe the initial boot output from a Cisco IOS switch

Log in to a Cisco IOS switch

Configure a Cisco IOS switch from the command line

Verify the initial switch operation

Use the appropriate show command for MAC address table management

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 268: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

2-58 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

Physical Startup of the Catalyst Switch The startup of a Catalyst switch requires verifying the physical installation, powering up the switch, and viewing the Cisco IOS Software output on the console. This topic describes the physical startup of a Catalyst switch.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-2

Initial Startup of the Catalyst Switch

System startup routines initiate switch software.Initial startup uses default configuration parameters.

The initial startup of a Catalyst switch requires completion of the steps in the table.

Step 1 Before starting the switch, verify the following:

All network cable connections are secure.

Your terminal is connected to the console port.

Your console terminal application, such as HyperTerminal, is selected.

Step 2 Attach the power cable plug to the switch power supply socket. The switch will start. There is no on/off switch on some Catalyst switches, including the Cisco Catalyst 2960 Series.

Step 3 Observe the boot sequence as follows:

Look at the light-emitting diodes (LEDs) on the switch chassis.

Observe the Cisco IOS Software output text on the console.

Note This course describes the Catalyst 2960 Series Switch only. Switch information and configuration commands presented are specific to the Catalyst 2960 Series. Your switch may differ.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 269: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Ethernet LANs 2-59

Switch LED Indicators The Catalyst switches have several status LEDs that are generally lit in green when the switch is functioning normally but that turn amber when there is a malfunction. This topic describes the states of the LEDs on Catalyst 2960 Series Switches.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-3

Catalyst 2960 Switch LED Indicators

The LED locations on the Catalyst 2960-12 and 2960-24 switches are shown in the figure and their functions are explained in the table.

Switch LED Description

System LED Off: System not powered up.

Green: System powered and operational.

Amber: System malfunction; one or more power-on self-test (POST) errors occurred.

Redundant power supply Off: Redundant power supply is off or is not installed.

Green: Redundant power supply is operational.

Flashing green: Redundant power supply is connected but unavailable because it is providing power to another device.

Amber: Redundant power supply is installed, not operational.

Flashing amber: Internal power supply failed and redundant power supply is providing power to the switch.

The port LED display modes are indicated in the table, with information about the various LED colors or lighting.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 270: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

2-60 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

Port LED Display Mode Description

Port status (STAT LED on) Off: No link present.

Green: Link present, no activity.

Flashing green: Link present with traffic activity.

Alternating green and amber: Link fault. Error frames can affect connectivity. Excessive collisions and cyclic redundancy check (CRC), alignment, and jabber errors are monitored for a link-fault indication.

Amber: Port not forwarding because the port was disabled by management, suspended because of an address violation, or suspended by Spanning Tree Protocol (STP) because of network loops.

Bandwidth utilization (UTL LED on) Green: Current bandwidth utilization displayed over the amber LED background on a logarithmic scale.

Amber: Maximum backplane utilization because the switch was powered on.

Green and amber: Depends on model as follows:

■ Catalyst 2960-12, 2960-24, 2960C-24, and 2960T-24 switches: If all LEDs are green, the switch is using 50 percent or more of the total bandwidth. If the far-right LED is off, the switch is using more than 25 percent but less than 50 percent of the total bandwidth, and so on. If only the far-left LED is green, the switch is using less than 0.0488 percent of the total bandwidth.

■ Catalyst 2960G-12-EI switches: If all LEDs are green, the switch is using 50 percent or more of the total bandwidth. If the LED for Gigabit Interface Converter (GBIC) module slot 2 is off, the switch is using more than 25 percent but less than 50 percent of the total bandwidth. If LEDs for both GBIC module slots are off, the switch is using less than 25 percent of the total bandwidth, and so on.

■ Catalyst 2960G-24-EI and 2960G-24-EI-DC switches: If all LEDs are green, the switch is using 50 percent or more of the total bandwidth.

■ GBIC module slot 2: If the LED is off, the switch is using more than 25 percent but less than 50 percent of the total bandwidth. If LEDs for both GBIC module slots are off, the switch is using less than 25 percent of the total bandwidth, and so on.

■ Catalyst 2960G-48-EI switches If all LEDs are green, the switch is using 50 percent or more of the total bandwidth. If the LED for the upper GBIC module slot is off, the switch is using more than 25 percent but less than 50 percent of the total bandwidth. If LEDs for both GBIC module slots are off, the switch is using less than 25 percent of the total bandwidth, and so on.

Full-duplex mode (FDUP LED on) Green: Ports configured in full-duplex mode.

Off: Ports configured in half-duplex mode.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 271: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Ethernet LANs 2-61

Viewing Initial Bootup Output from the Switch During initial startup, if POST failures are detected, they are reported to the console. If POST completes successfully, you can configure the switch. This topic describes how to view the initial bootup output from a Catalyst switch.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-4

Initial Bootup Output from the Catalyst 2960 Switch

After POST completes successfully on a Catalyst 2960 switch, there is a prompt to enter the initial configuration for the switch. An automatic setup program can be used to assign switch IP information, host and cluster names, and passwords, and to create a default configuration for continued operation. Later, the CLI can be used to customize the configuration. To run the setup program, access the switch from the PC terminal that was connected to the console port.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 272: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

2-62 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

Complete the initial configuration by answering each question as it appears, as shown here.

--- System Configuration Dialog ---

Would you like to enter the initial configuration dialog? [yes/no]: y

At any point you may enter a question mark '?' for help.

Use ctrl-c to abort configuration dialog at any prompt.

Default settings are in square brackets '[]'.

Basic management setup configures only enough connectivity

for management of the system, extended setup will ask you

to configure each interface on the system

Would you like to enter basic management setup? [yes/no]: no

First, would you like to see the current interface summary? [yes]: no

Configuring global parameters:

Enter host name [Switch]: SwitchX

The enable secret is a password used to protect access to

privileged EXEC and configuration modes. This password, after entered, becomes encrypted in the configuration.

Enter enable secret: secret_password

The enable password is used when you do not specify an

enable secret password, with some older software versions, and some boot images.

Enter enable password: enable_password

The virtual terminal password is used to protect

access to the router over a network interface.

Enter virtual terminal password: vty_password

Configure SNMP Network Management? [no]: no

Configuring interface parameters:

Do you want to configure Vlan1 interface? [yes]: yes

Configure IP on this interface? [yes]: yes

IP address for this interface: 10.1.1.140

Subnet mask for this interface [255.0.0.0] : 255.255.255.0

Class A network is 10.0.0.0, 24 subnet bits; mask is /24

Do you want to configure FastEthernet0/1 interface? [yes]: n

..text omitted ..

Do you want to configure FastEthernet0/24 interface? [yes]: n

Would you like to enable as a cluster command switch? [yes/no]: n

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 273: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Ethernet LANs 2-63

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-5

Initial Configuration of the Catalyst 2960 Switch Using Setup

After the required settings are entered, the setup program displays the configuration to be confirmed, as follows:

The following configuration command script was created:

hostname SwitchX

enable secret 5 $1$oV63$8z7cBuveTibpCn1Rf5uI01

enable password enable_password

line vty 0 15

password vty_password

no snmp-server

!

!

interface Vlan1

ip address 10.1.1.140 255.255.255.0

!

interface FastEthernet0/1

..text omitted..

interface FastEthernet0/24

!

end

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 274: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

2-64 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

[0] Go to the IOS command prompt without saving this config.

[1] Return back to the setup without saving this config.

[2] Save this configuration to nvram and exit.

Enter your selection [2]:2

Building configuration...

[OK]

Use the enabled mode 'configure' command to modify this configuration.

Enter 2 to complete the initial configuration.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 275: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Ethernet LANs 2-65

Logging In to the Switch When Catalyst switches are configured from the CLI that runs on the console or a remote terminal, the Cisco IOS Software provides a CLI called the EXEC. The EXEC interprets the commands that are entered and carries out the corresponding operations. This topic describes how to log in to a Catalyst switch to begin the initial configuration.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-6

Logging In to the Switch and Entering the Privileged EXEC Mode

For security purposes, the EXEC has two levels of access to commands:

User mode: Typical tasks include those that check the status of the switch.

Privileged mode: Typical tasks include those that change the configuration of the switch. This mode is also known as enable mode.

To change from user EXEC mode to privileged EXEC mode, enter the enable command. The switch then prompts for the enable password if one is configured. Enter the correct enable password. By default, the enable password is not configured.

Note For security reasons, the network device will not echo the password that you enter. However, if you are configuring a network device over a modem link or using Telnet, the password is sent in cleartext. Telnet does not offer a method to secure packets. Secure Shell Protocol (SSH) should be used for remote access.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 276: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

2-66 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

Configuring a Switch from the Command Line The Catalyst switch IOS software has different configuration modes, including the global configuration mode and the interface configuration mode. This topic describes how to complete the initial switch configuration using both modes.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-7

Configuration modes:Global configuration mode – SwitchX#configure terminal

– SwitchX(config)#

Interface configuration mode– SwitchX(config)#interface fa0/1

– SwitchX(config-if)#

Configuring the Switch

To configure global switch parameters such as the switch host name or the switch IP address used for switch management purposes, use the global configuration mode. To configure a particular port (interface), use the interface configuration mode.

Note More switch configuration details are provided throughout this course. This section provides an overview of switch configuration so you can perform an initial configuration on your switch.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 277: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Ethernet LANs 2-67

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-8

Sets the local identity for the switch

Configuring Switch Identification

One of the first tasks in configuring a switch is to name it. Naming the switch provides a means to better manage the network by being able to uniquely identify each switch within the network. The name of the switch is considered to be the host name and is the name displayed at the system prompt. The switch name is assigned in global configuration mode. In the example shown in the figure, the switch name is set to SwitchX.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 278: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

2-68 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-9

Example:

SwitchX(config)#interface vlan 1SwitchX(config-if)#ip address 10.5.5.11 255.255.255.0SwitchX(config-if)#no shutdown

Note: It is necessary to use the no shutdown command to make the interface operational.

SwitchX(config)#interface vlan 1SwitchX(config-if)#ip address {ip address} {mask}

Configuring the Switch IP Address

The switch’s management interface operates as a virtual Layer 3 host within the Layer 2 switch. Remote access to the switch’s management interface is accomplished using the Layer 3 protocol and network applications of TCP/IP. Because of this a Layer 3 address must be assigned to the switch. The management interface resides in VLAN 1, therefore the IP address is assigned to VLAN 1.

To configure an IP address and subnet mask for the switch, you must be in VLAN 1 interface configuration mode and then use the ip address configuration command. An IP address is required on the switch for management purposes.

For example, an IP address must be assigned if a Telnet connection is to be used, or if the Simple Network Management Protocol (SNMP) will be used to manage the switch.

You must use the no shutdown interface configuration command to make the interface operational.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 279: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Ethernet LANs 2-69

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-10

SwitchX(config)#ip default-gateway 172.20.137.1

Example:

SwitchX(config)#ip default-gateway {ip address}

Configuring the Switch Default Gateway

To configure a default gateway for the switch, use the ip default-gateway command. Enter the IP address of the next-hop router interface that is directly connected to the switch where a default gateway is being configured. The default gateway receives IP packets with unresolved destination IP addresses from the switch EXEC processes.

Once the default gateway is configured, the switch has connectivity to the remote networks that it needs to communicate with.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 280: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

2-70 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-11

Saving Configurations

Copies the current configuration to NVRAM

SwitchX

SwitchX copy running-config startup-config

Destination filename [startup-config]?

Building configuration…

SwitchX

After the commands to configure the router have been entered, you must save the running configuration to NVRAM with the copy running-config startup-config command. If the configuration is not saved to NVRAM and the router is reloaded, the configuration will be lost and the router will revert to the last configuration saved in NVRAM.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 281: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Ethernet LANs 2-71

Showing the Switch Initial Startup Status After logging in to a Catalyst switch, the switch initial startup status can be verified using the following switch status commands: show version, show running-config, and show interfaces. This topic describes the switch status commands that can be used to verify the initial switch operation.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-12

Showing Switch Initial Startup Status

SwitchX#show version

Displays the configuration of the system hardware, software version, names and sources of configuration files, and boot images

SwitchX#show running-config

Displays the current active configuration file of the switch

SwitchX#show interfaces

Displays statistics for all interfaces configured on the switch

Switch status commands are as follows:

show version: Displays the configuration of the system hardware and the software version information.

show running-config: Displays the current active (running) configuration file of the switch. This command requires privileged EXEC mode access. The IP address, subnet mask, and default-gateway settings will be displayed here.

show interfaces: Displays statistics and status information of all the interfaces on the switch. Both the switch trunks and the switch line ports are considered interfaces. The resulting output varies, depending on the network for which an interface has been configured. Usually this command is entered with the options type and slot/number, where type allows values such as Ethernet and Fast Ethernet, and slot/number indicates slot 0 and the port number on the selected interface (for example, e0/1).

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 282: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

2-72 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-13

Switch#show version

SOFTWARE (fc1)Copyright (c) 1986-2006 by Cisco Systems, Inc.Compiled Fri 28-Jul-06 11:57 by yenanhImage text-base: 0x00003000, data-base: 0x00BB7944

ROM: Bootstrap program is C2960 boot loaderBOOTLDR: C2960 Boot Loader (C2960-HBOOT-M) Version 12.2(25r)SEE1, RELEASE SOFTWARE (fc1)

System returned to ROM by power-onSystem image file is "flash:c2960-lanbasek9-mz.122-25.SEE2/c2960-lanbasek9-mz.122-25.SEE2.bin"

Processor board ID FOC1052W3XCLast reset from power-on1 Virtual Ethernet interface24 FastEthernet interfaces2 Gigabit Ethernet interfacesThe password-recovery mechanism is enabled.

! Text omitted

Switch#

Switch show version CommandCisco IOS Software, C2960 Software (C2960-LANBASEK9-M), Version 12.2(25)SEE2, RELEASE

Switch uptime is 24 minutes

cisco WS-C2960-24TT-L (PowerPC405) processor (revision B0) with 61440K/4088K bytes of memory.

Use the show version EXEC command to display the configuration of the system hardware and the software version information. The table describes some of the output fields from the show version command.

Output Description

Cisco IOS version Information identifying the software by name and version number.

Always specify the complete version number when reporting a possible software problem. In the example, the switch is running Cisco IOS Version 12.2(25)SEE2.

Switch uptime Current days and time since the system was last booted.

In the example, the switch uptime is 24 minutes.

Switch platform Shows the hardware platform information including revision and RAM.

The display in the figure is from a Cisco Catalyst WS-C2960-24 switch with 24 Fast Ethernet ports.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 283: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Ethernet LANs 2-73

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-14

Switch show interfaces CommandSwitchX#show interfaces FastEthernet0/2

FastEthernet0/2 is up, line protocol is up (connected)

Hardware is Fast Ethernet, address is 0008.a445.ce82 (bia 0008.a445.ce82)

MTU 1500 bytes, BW 10000 Kbit, DLY 1000 usec,

reliability 255/255, txload 1/255, rxload 1/255

Encapsulation ARPA, loopback not set

Keepalive set (10 sec)

Half-duplex, 10Mb/s

input flow-control is unsupported output flow-control is unsupported

ARP type: ARPA, ARP Timeout 04:00:00

Last input 4w6d, output 00:00:01, output hang never

Last clearing of "show interface" counters never

Input queue: 0/75/0/0 (size/max/drops/flushes); Total output drops: 0

Queueing strategy: fifo

Output queue: 0/40 (size/max)

5 minute input rate 0 bits/sec, 0 packets/sec

5 minute output rate 0 bits/sec, 0 packets/sec

182979 packets input, 16802150 bytes, 0 no bufferReceived 49954 broadcasts (0 multicast)

0 runts, 0 giants, 0 throttles

0 input errors, 0 CRC, 0 frame, 0 overrun, 8 ignored

0 watchdog, 20115 multicast, 0 pause input

0 input packets with dribble condition detected

3747473 packets output, 353656347 bytes, 0 underruns

--More--

Half-duplex, 10Mb/s

0 CRC,

Hardware is Fast Ethernet, address is 0008.a445.ce82 (bia 0008.a445.ce82)

The show interfaces command displays status and statistics information on the network interfaces of the switch. The table shows some fields in the display that are useful for checking on fundamental switch details.

Output Description

FastEthernet0/2 is up Indicates the status of the interface hardware. In this example, it is functioning correctly. The hardware status is followed by the status of the line protocol, which in this example is also operational and active.

address is 0008.a445.ce82…

Shows the MAC address that identifies the interface hardware.

Half-duplex, 10 Mb/s Shows the type mode of connection. Other possibilities include full duplex, 100 Mb/s.

CRC Shows that there were 0 CRC errors. CRC errors can indicate duplex mismatch or a malfunctioning Ethernet adapter in an attached device.

The show interfaces command will be used frequently while configuring and monitoring network devices.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 284: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

2-74 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

MAC Address Table Management This topic describes how to set permanent and static addresses in the MAC address table.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-15

Catalyst 2960 Series

SwitchX#show mac-address-tableMac Address Table

-------------------------------------------Vlan Mac Address Type Ports---- ----------- -------- -----All 0008.a445.9b40 STATIC CPUAll 0100.0ccc.cccc STATIC CPUAll 0100.0ccc.cccd STATIC CPUAll 0100.0cdd.dddd STATIC CPU1 0008.e3e8.0440 DYNAMIC Fa0/2

Total Mac Addresses for this criterion: 5SwitchX#

Managing the MAC Address Table

Switches use the MAC address tables to forward traffic between ports. These MAC tables include dynamic, permanent, and static addresses.

Dynamic addresses are source MAC addresses that are learned by the switch, then dropped when they are not refreshed and aged out. The switch provides dynamic addressing by learning the source MAC address of each frame that it receives on each port, then adding the source MAC address and its associated port number to the MAC address table. As stations are added or removed from the network, the switch updates the MAC address table, adding new entries and aging out those that are currently not in use.

An administrator can specifically assign permanent addresses to certain ports. Unlike dynamic addresses, permanent addresses are not aged out.

The maximum size of the MAC address table varies with different switches. For example, the Catalyst 2960 series switch can store up to 8192 MAC addresses. When the MAC address table is full, traffic for all new unknown addresses is flooded.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 285: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Ethernet LANs 2-75

Summary This topic summarizes the key points that were discussed in this lesson.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-16

Summary

The startup of a Cisco IOS switch requires verifying the physical installation, powering up the switch, and viewing the Cisco IOS software output on the console.Cisco IOS switches have several status LEDs that are generally green when the switch is functioning normally but turn amber when there is a malfunction.The Cisco Catalyst POST is executed only when the switch is powered up. During initial startup, if POST test failures are detected, they are reported to the console. If POST completes successfully, the switch can be configured.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-17

Summary (Cont.)

When starting any mode on a Cisco IOS switch, begin in user EXEC mode. To change modes, a password must be entered. The Catalyst IOS switches can be configured using the global andother configuration modes, similar to the routers.Configure a Cisco IOS switch from the command line to add the host name and IP addressing. After logging into a Catalyst switch, the switch software and hardware status can be verified using show version, showrunning-config, and show interfaces commands.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 286: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

2-76 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 287: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

Lesson 6

Understanding Switch Security

Overview After physical access has been secured, there is growing need to ensure that access to the switch via the console port and the vty ports are secure. In addition, it is important to ensure that unused switch ports do not become a security hole.

Objectives Upon completing this lesson, you will be able to implement a basic configuration for a Cisco switch. This ability includes being able to meet these objectives:

Describe how to mitigate hardware, environmental, electrical, and maintenance-related security threats to Cisco switches

Configure password security

Configure the login banner

Describe the difference between using Telnet versus SSH for remote access

Configure port security

Secure unused ports

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 288: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

2-78 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

Physical and Environmental Threats Improper and incomplete network device installation is an often-overlooked security threat that, if left uncorrected, can have dire results. Software-based security measures alone cannot prevent premeditated or even accidental network damage due to poor installation. This topic describes how to mitigate hardware, environmental, electrical, and maintenance-related security threats to Cisco IOS devices.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-2

Common Threats to Physical Installations

Hardware threatsEnvironmental threatsElectrical threatsMaintenance threats

There are four classes of insecure installations or physical access threats:

Hardware threats: The threat of physical damage to the switch or switch hardware

Environmental threats: Threats such as temperature extremes (too hot or too cold) or humidity extremes (too wet or too dry)

Electrical threats: Threats such as voltage spikes, insufficient supply voltage (brownouts), unconditioned power (noise), and total power loss

Maintenance threats: Threats such as poor handling of key electronic components (electrostatic discharge), lack of critical spare parts, poor cabling, poor labeling, and so on

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 289: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Ethernet LANs 2-79

Configuring Password Security The command-line interface (CLI) is used to configure the password, and other console commands. This topic describes an essential configuration task, password configuration.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-3

Configuring a Switch Password

Caution The passwords are for instructional purposes only. Passwords used in an actual implementation should meet the requirements of a “strong” password.

You can secure a switch by using passwords to restrict access. Using passwords and assigning privilege levels is a simple way of providing terminal access control in a network. Passwords can be established on individual lines, such as the console, and to the privileged EXEC mode. Passwords are case sensitive.

Each Telnet port on the switch is known as a virtual type terminal (vty). There are a maximum of five vty ports on the switch, allowing five concurrent Telnet sessions. On the switch, the vty ports are numbered from 0 through 4.

Use the line console 0 command followed by the password and login subcommands to require login and establish a login password on the console terminal or on a vty port. By default, login is not enabled on the console or on vty ports.

The line vty 0 4 command followed by the password and login subcommands require login and establish a login password on incoming Telnet sessions.

The login local command can be used to enable password checking on a per-user basis using the username and password specified with the username global configuration command. The username command establishes username authentication with encrypted passwords.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 290: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

2-80 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

The enable password global command restricts access to the privileged EXEC mode. You can assign an encrypted form of the enable password, called the enable secret password, by entering the enable secret command with the desired password at the global configuration mode prompt. If the enable secret password is configured, it is used instead of the enable password, not in addition to it.

You can also add a further layer of security, which is particularly useful for passwords that cross the network or are stored on a TFTP server. Cisco provides a feature that allows the use of encrypted passwords. To set password encryption, enter the service password-encryption command in the global configuration mode.

Passwords that are displayed or set after you configure the service password-encryption command will be encrypted.

To disable a command, enter no before the command. For example, use the no service password-encryption command to disable password encryption.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 291: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Ethernet LANs 2-81

Configuring the Login Banner The CLI is used to configure the “message of the day” and other console commands. This topic describes some essential configuration tasks to enable the login banner.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-4

Configuring the Login Banner

Defines and enables a customized banner to be displayed before the username and password login prompts.

SwitchX# banner login " Access for authorized users only. Please enter your username and password. "

You can define a customized banner to be displayed before the username and password login prompts, by using the banner login command in global configuration mode. To disable the login banner, use the no form of this command.

When the banner login command is entered, follow the command with one or more blank spaces and a delimiting character of any choice. In the example, the delimiting character is a double quotation mark ("). After the banner text has been added, terminate the message with the same delimiting character.

Warning Caution should be used when selecting the words that are used in the login banner. Words like “welcome” may imply that access is not restricted and allow hackers to defend their actions.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 292: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

2-82 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

Telnet vs. SSH Access This topic discusses the method of selecting which access mode is enabled for remote access.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-5

Telnet vs. SSH Access

Telnet– Most common access method– Insecure

SSH-encrypted !– The username command create the username and password for the SSH sessionUsername cisco password cisco

ip domain-name mydomain.com

crypto key generate rsa

ip ssh version 2

line vty 0 4login localtransport input ssh

Telnet is the most common method of accessing a network device. However, Telnet is an insecure way of accessing a network and is therefore not an option. Secure Shell Protocol (SSH) is a secure replacement for Telnet that gives the same type of access. Communication between the client and server is encrypted in both SSHv1 and SSHv2. Implement SSHv2 when possible because it uses a more enhanced security encryption algorithm.

First test the authentication without SSH to make sure that authentication works with the switch. Authentication can be with a local username and password or with an authentication, authorization, and accounting (AAA) server that runs Terminal Access Controller Access Control System Plus (TACACS+) or Remote Authentication Dial-In User Service (RADIUS). (Authentication through the line password is not possible with SSH.) The following example shows local authentication, which lets you use Telnet to get access to the switch with username cisco and password cisco.

!--- The username command create the username and password for the SSH session

username cisco password 0 cisco

ip domain-name mydomain.com

crypto key generate rsa

ip ssh version 2

line vty 0 4

login local

transport input telnet

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 293: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Ethernet LANs 2-83

In order to test authentication with SSH, you have to add to the previous statements to enable SSH. Then test SSH from the PC and UNIX stations.

If you want to prevent non-SSH connections, add the transport input ssh command under the lines to limit the switch to SSH connections only. Straight (non-SSH) Telnet connections are refused.

line vty 0 4

!--- Prevent non-SSH Telnets.

transport input ssh

Test to make sure that non-SSH users cannot use Telnet to gain access to the switch.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 294: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

2-84 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

Port Security Configuration This topic describes how to configure port security.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-6

Cisco Catalyst 2960 Series

SwitchX(config-if)#switchport port-security [ mac-address mac-address | mac-address sticky [mac-address] | maximum value | violation {restrict | shutdown}]

SwitchX(config)#interface fa0/5SwitchX(config-if)#switchport mode accessSwitchX(config-if)#switchport port-securitySwitchX(config-if)#switchport port-security maximum 1SwitchX(config-if)#switchport port-security mac-address stickySwitchX(config-if)#switchport port-security violation shutdown

Configuring Port Security

You can use the port security feature to restrict input to an interface by limiting and identifying MAC addresses of the stations allowed to access the port. When you assign secure MAC addresses to a secure port, the port does not forward packets with source addresses outside the group of defined addresses.

Note Before port security can be activated, the port mode must be set to access using the switchport mode access command.

With the Cisco Catalyst 2960 Series, use the switchport port-security interface command without keywords to enable port security on an interface. Use the switchport port-security interface command with keywords to configure a secure MAC address, a maximum number of secure MAC addresses, or the violation mode. Use the no form of this command to disable port security or to set the parameters to their default state.

Note A port must be in access mode to enable port security.

You can add secure addresses to the address table after you set the maximum number of secure MAC addresses allowed on a port in these ways:

Manually configure all of the addresses (switchport port-security mac-address 0008.eeee.eeee).

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 295: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Ethernet LANs 2-85

Allow the port to dynamically configure all of the addresses (switchport port-security mac-address sticky).

Configure a number of MAC addresses and allow the rest of the addresses to be dynamically configured.

You can configure an interface to convert the dynamic MAC addresses to sticky secure MAC addresses and to add them to the running configuration by enabling sticky learning. To enable sticky learning, enter the switchport port-security mac-address sticky interface configuration command. When you enter this command, the interface converts all the dynamic secure MAC addresses, including those that were dynamically learned before sticky learning was enabled, to sticky secure MAC addresses.

The sticky secure MAC addresses do not automatically become part of the configuration file, which is the startup configuration that is used each time the switch restarts. If you save the sticky secure MAC addresses in the configuration file, when the switch restarts, the interface does not need to relearn these addresses. If you do not save the configuration, the MAC addresses are lost. If sticky learning is disabled, the sticky secure MAC addresses are converted to dynamic secure addresses and are removed from the running configuration. A secure port can have from 1 to 132 associated secure addresses. The total number of available secure addresses on the switch is 1024.

Security violation situations are as follows:

The maximum number of secure MAC addresses has been added to the address table, and a station whose MAC address is not in the address table attempts to access the interface.

An address learned or configured on one secure interface is seen on another secure interface in the same VLAN.

Note Port security is disabled by default.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 296: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

2-86 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-7

SwitchX#show port-security [interface interface-id] [address] [ | {begin | exclude | include} expression]

SwitchX#show port-security interface fastethernet 0/5Port Security : EnabledPort Status : Secure-upViolation Mode : ShutdownAging Time : 20 minsAging Type : AbsoluteSecureStatic Address Aging : DisabledMaximum MAC Addresses : 1Total MAC Addresses : 1Configured MAC Addresses : 0Sticky MAC Addresses : 0Last Source Address : 0000.0000.0000Security Violation Count : 0

Verifying Port Security on the Catalyst 2960 Series

On the Catalyst 2960 Series, use the show port-security interface privileged EXEC command to display the port security settings defined for an interface.

An address violation occurs when a secured port receives a source address that has been assigned to another secured port or when a port tries to learn an address that exceeds its address table size limit, which is set with the switchport port-security maximum command.

The table lists the parameters that can be used with the show port-security command.

Command Description

interface interface-id (Optional) Displays the port security settings for the specified interface.

address (Optional) Displays all the secure addresses on all ports.

begin (Optional) Sets the display to begin with the line that matches the specified expression.

exclude (Optional) Sets the display to exclude lines that match the specified expression.

include (Optional) Sets the display to include lines that match the specified expression.

expression Enters the expression that will be used as a reference point in the output.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 297: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Ethernet LANs 2-87

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-8

SwitchX#sh port-securitySecure Port MaxSecureAddr CurrentAddr SecurityViolation Security Action

(Count) (Count) (Count)--------------------------------------------------------------------------

Fa0/5 1 1 0 Shutdown---------------------------------------------------------------------------Total Addresses in System (excluding one mac per port) : 0Max Addresses limit in System (excluding one mac per port) : 1024

SwitchX#sh port-security addressSecure Mac Address Table

-------------------------------------------------------------------Vlan Mac Address Type Ports Remaining Age

(mins)---- ----------- ---- ----- -------------1 0008.dddd.eeee SecureConfigured Fa0/5 -

-------------------------------------------------------------------Total Addresses in System (excluding one mac per port) : 0 Max Addresses limit in System (excluding one mac per port) : 1024

Verifying Port Security on the Catalyst 2960 Series (Cont.)

Use the show port-security address command to display the secure MAC addresses for all ports. Use the show port-security command without keywords to display the port security settings for the switch.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 298: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

2-88 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

Securing Unused Ports This topic describes the need to secure unused ports.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-9

Securing Unused Ports

Unsecured ports can create a security hole. A switch plugged into an unused port will be added to the network.Secure unused ports by disabling interfaces (ports).

In a home, an unlocked door can be a security risk. The same is true of an unused port on a switch. A hacker can plug a switch into an unused port and become part of the network. Therefore, unsecured ports can create a security hole. To prevent the issue, you should secure unused ports by disabling unused interfaces (ports).

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 299: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Ethernet LANs 2-89

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-10

Disabling an Interface (Port)

shutdown

SwitchX(config-int)#

To disable an interface, use the shutdown command in interface configuration mode.To restart a disabled interface, use the no form of this command.

To disable an interface, use the shutdown command in interface configuration mode. To restart a disabled interface, use the no form of this command: no shutdown.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 300: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

2-90 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

Summary This topic summarizes the key points that were discussed in this lesson.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-11

Summary

The first level of security is physical.Passwords can be used to limit access to users that have been given the password. The login banner can be used to display a message before the user is prompted for a username.Telnet sends session traffic in cleartext; SSH encrypts the session traffic. Port security can be used to limit MAC addresses to a port.Unused ports should be shut down.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 301: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

Lesson 7

Maximizing the Benefits of Switching

Overview As devices are added to LANs to accommodate more users, and more bandwidth is required by more networked software applications, maintaining an acceptable level of network performance becomes an increasing challenge. There are a number of ways to enhance switched Ethernet LANs to meet the demands of users for performance and availability. This lesson describes several performance-enhancement methods, including microsegmentation, full-duplex communication, and Spanning Tree solutions.

Objectives Upon completing this lesson, you will be able to list the ways in which an Ethernet LAN can be optimized. This ability includes being able to meet these objectives:

List the characteristics and advantages of microsegmentation

Compare half-duplex and full-duplex operation in an Ethernet LAN

Identify the need for different media rates in enterprise networks and describe how this need can be satisfied in a switched Ethernet network

Describe how loops can affect performance in a switched LAN

Describe how STP protects against loops resulting from physical redundancy in an Ethernet LAN

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 302: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

2-92 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

Microsegmentation Microsegmentation eliminates the possibility of collisions on the network segment, providing a number of benefits in increasing network performance. This topic describes how microsegmentation functions in a switched LAN.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-2

Microsegmentation

Microsegmentation of the Network

Implementing LAN switching provides microsegmentation. Each device on a network segment is connected directly to a switch port and does not have to compete with any other device on the segment for bandwidth. This important function eliminates collisions and increases the effective data rate through full-duplex operation, resulting in a significant increase in available bandwidth.

Example: Getting a Dedicated On-Ramp Data transmission can be compared to a freeway, with data frames traveling over the freeway like automobiles. Just as automobiles use on-ramps to access the freeway, devices join the network when they want to transmit data. As more and more cars travel on the freeway, however, the on-ramps may become congested, allowing access to only a few cars, and there may even be collisions. If each car had its own on-ramp, however, all the cars would have equal access to the freeway, and there would be no delays or collisions. The microsegmentation that LAN switches provide gives each network device its own “on-ramp” so the device does not have to compete with other devices to use the network “freeway.”

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 303: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Ethernet LANs 2-93

Duplex Communication Full-duplex communication increases effective bandwidth by allowing both ends of the connection to transmit simultaneously. However, this method of optimizing network performance requires microsegmentation before full-duplex communication can occur. This topic describes half-duplex and full-duplex communication, and illustrates how full-duplex communication can improve the performance of a switched LAN.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-3

Half Duplex (CSMA/CD)Unidirectional data flowHigher potential for collisionHub connectivity

Full DuplexPoint-to-point onlyAttached to dedicated switched portRequires full-duplex support on both endsCollision-free Collision detect circuit disabled

Duplex Overview

Half-duplex transmission mode implements Ethernet Carrier Sense Multiple Access with Collision Detection (CSMA/CD). The traditional shared LAN operates in half-duplex mode and is susceptible to transmission collisions across the wire.

Full-duplex Ethernet significantly improves network performance without the expense of installing new media. Full-duplex transmission between stations is achieved by using point-to-point Ethernet, Fast Ethernet, and Gigabit Ethernet connections. This arrangement is collision-free. Frames sent by the two connected end nodes cannot collide because the end nodes use two separate circuits in the Category 5 or Category 3 cable. Each full-duplex connection uses only one port.

Full-duplex port connections are point-to-point links between switches or end nodes, but not between shared hubs. Nodes that are directly attached to a dedicated switch port with Network Interface Cards (NICs) that support full-duplex should be connected to switch ports that are configured to operate in full-duplex mode. Most Ethernet, Fast Ethernet, and Gigabit Ethernet NICs sold today offer full-duplex capability. In full-duplex mode, the collision detect circuit is disabled.

Nodes that are attached to hubs that share their connection to a switch port must operate in half-duplex mode because the end stations must be able to detect collisions.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 304: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

2-94 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

Standard shared Ethernet configuration efficiency is typically rated at 50 to 60 percent of the 10-Mb/s bandwidth. Full-duplex Ethernet offers 100 percent efficiency in both directions (10-Mb/s transmit and 10-Mb/s receive).

Full-Duplex Communication Because each device on a microsegmented switched LAN is connected directly to a port on a switch, the switch port and that device have a point-to-point connection. In networks with hubs instead of switches, devices can communicate in only one direction at a time because they must compete for the network bandwidth. This type of communication is referred to as half-duplex communication, because it allows data to be either sent or received at one time, but not both. Microsegmented switch ports, however, can provide the devices connected to them with full-duplex mode communication, allowing the devices to both send and receive data simultaneously. This ability effectively doubles the amount of bandwidth between the devices.

Example: Data Conversations If you use a voice communication device such as a walkie-talkie, you will be communicating in half-duplex mode. You can talk, but then you must stop talking to hear what the person on the other end of the communication is saying. With a telephone, however, you can communicate with someone in full-duplex mode; each person can both talk and hear what the other person says simultaneously.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-4

Cisco Catalyst 2960 Series

SwitchX(config)#interface fa0/1SwitchX(config-if)#duplex {auto | full | half}

Cisco Catalyst 2960 Series

SwitchX(config)#interface fa0/1SwitchX(config-if)#speed {10 | 100 | 1000 | auto}

Setting Duplex and Speed Options

Duplex Interface Configuration This topic describes how to set and view duplex options.

Use the duplex interface configuration command to specify the duplex mode of operation for switch ports.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 305: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Ethernet LANs 2-95

The duplex parameters on the Cisco Catalyst 2960 Series are as follows:

The auto option sets autonegotiation of duplex mode. With autonegotiation enabled, the two ports communicate to decide the best mode of operation.

The full option sets full-duplex mode.

The half option sets half-duplex mode.

For Fast Ethernet and 10/100/1000 ports, the default is auto. For 100BASE-FX ports, the default is full. The 10/100/1000 ports operate in either half- or full-duplex mode when they are set to 10 or 100 Mb/s, but when set to 1000 Mb/s, they operate only in full-duplex mode.

100BASE-FX ports operate only at 100 Mb/s in full-duplex mode.

Note To determine the default duplex mode settings for the Gigabit Interface Converter (GBIC) module ports, refer to the documentation that came with your GBIC module.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-5

SwitchX#show interfaces fastethernet0/2FastEthernet0/2 is up, line protocol is up (connected)

Hardware is Fast Ethernet, address is 0008.a445.9b42 (bia 0008.a445.9b42)MTU 1500 bytes, BW 10000 Kbit, DLY 1000 usec,

reliability 255/255, txload 1/255, rxload 1/255Encapsulation ARPA, loopback not setKeepalive set (10 sec)Half-duplex, 10Mb/sinput flow-control is unsupported output flow-control is unsupportedARP type: ARPA, ARP Timeout 04:00:00Last input 00:00:57, output 00:00:01, output hang neverLast clearing of "show interface" counters neverInput queue: 0/75/0/0 (size/max/drops/flushes); Total output drops: 0Queueing strategy: fifoOutput queue: 0/40 (size/max)5 minute input rate 0 bits/sec, 0 packets/sec5 minute output rate 0 bits/sec, 0 packets/sec

323479 packets input, 44931071 bytes, 0 no bufferReceived 98960 broadcasts (0 multicast)1 runts, 0 giants, 0 throttles1 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored0 watchdog, 36374 multicast, 0 pause input0 input packets with dribble condition detected1284934 packets output, 103121707 bytes, 0 underruns0 output errors, 2 collisions, 6 interface resets0 babbles, 0 late collision, 29 deferred0 lost carrier, 0 no carrier, 0 PAUSE output0 output buffer failures, 0 output buffers swapped out

Showing Duplex Options

Example: Showing Duplex Options Verify the duplex settings by using the show interfaces command on the Catalyst 2960 Series. The show interfaces privileged EXEC command displays statistics and status for all or specified interfaces. The figure shows the duplex setting of an interface.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 306: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

2-96 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

Autonegotiation can at times produce unpredictable results. By default, when autonegotiation fails, the Catalyst switch sets the corresponding switch port to half-duplex mode. This type of failure happens when an attached device does not support autonegotiation. If the device is manually configured to operate in the half-duplex mode, it will match the default mode of the switch. However, autonegotiation errors can happen if the device is manually configured to operate in full-duplex mode. This configuration, half-duplex on one end and full-duplex on the other, causes late collision errors at the half-duplex end. To avoid this situation, manually set the duplex parameters of the switch to match the attached device.

If the switch port is in full-duplex mode and the attached device is in half-duplex mode, check for frame check sequence (FCS) errors on the switch full-duplex port.

You can use the show interfaces command to check for FCS late collision errors.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 307: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Ethernet LANs 2-97

The Need for Different Media Rates in an Enterprise Network

Large networks include large numbers of end systems, servers, and network devices, and each may require different speeds to be interconnected. This topic describes the reasons for different speed requirements in an enterprise network.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-6

The Hierarchy of Connectivity

There are a number of higher-speed Ethernet protocols (such as Fast Ethernet and Gigabit Ethernet) that can provide the speed that is required to ensure the performance that is vital to large networks. However, the cost of implementing high-speed connections in all parts of an enterprise network would be very expensive and would not be consistently used by all users and devices. Employing a hierarchy of Ethernet connectivity, therefore, is usually the most efficient way to supply speed where it will be most effective.

In a typical connectivity hierarchy, the end-user devices are usually referred to as the access- level systems, because they are the primary point at which the network is accessed to transmit data. End-user systems are aggregated at the server or workgroup (distribution) level, and if necessary, end-user systems will use the backbone (or core) to reach another distribution device. Higher connectivity speed is usually reserved for those devices that transmit large quantities of data from multiple users, notably at the distribution and core levels.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 308: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

2-98 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

Physical Redundancy in an Ethernet LAN When multiple switches are implemented on the same network, there is a potential for intentional or unintentional physical loops. When loops occur, broadcast storms may be created, propagating frames throughout the network. This topic describes how loops can affect performance in a switched LAN.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-7

Loops

Adding switches to LANs can add the benefit of redundancy; that is, connecting two switches to the same network segments to ensure continual operations in case there are problems with one of the segments. Redundancy can ensure the availability of the network at all times. However, when switches are used for redundancy in a network, there is the potential problem of loops. When a host on one network segment transmits data to a host on another network segment, and the two are connected by two or more switches, each switch receives the data frames, looks up the location of the receiving device, and forwards the frame. Because each switch forwarded the frame, there is a duplication of each frame. This process results in a loop, and the frame circulates between the two paths without being removed from the network. The MAC tables may also be updated with incorrect address information, resulting in inaccurate forwarding.

In addition to basic connectivity problems, the proliferation of broadcast messages in networks with loops represents a serious network problem. Because of how switches operate, any multicast, broadcast, or unknown traffic will be flooded out to all ports except the incoming port. The resulting effect is a “storm” of traffic being looped endlessly through the network, almost instantly consuming the available bandwidth.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 309: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Ethernet LANs 2-99

Example: Loops in a Switched Network Suppose that a host named London sends a frame to a host named Rome. London resides on network segment A, and Rome resides on network segment B. Redundant connections between hosts are provided to ensure continual operations in the case of a segment failure. For this example, it is assumed that none of the switches have learned host B’s address.

Switch 1 receives the frame destined for host B and floods it out to switches 2 and 3. Both switch 2 and switch 3 receive the frame from London (via switch 1) and correctly learn that London is on segment 1 and 2 respectively. Each switch forwards the frame to switch 4.

Switch 4 receives two copies of the frame from London, one copy through switch 2 and one copy through switch 3. Let’s assume that the frame from Switch 2 arrives first. Switch 4 learns that London resides on segment 3. Since switch 4 does not know Rome’s address, it forwards the frame from switch 2 to Rome and switch 3. When the frame from Switch 3 arrives at switch 4, Switch 4 updates its table to indicate that London resides on segment 4. It then forwards the frame to Rome and Switch 2.

Switches 2 and 3 now change their internal tables to indicate that London is on segment 3 and 4 respectively. If the initial frame from London were a broadcast frame, both switches would forward the frames endlessly, using all available network bandwidth and blocking the transmission of other packets on both segments. This situation is called a broadcast storm.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 310: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

2-100 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

Loop Resolution with Spanning Tree Protocol Spanning Tree Protocol (STP) is a means to resolve loops in a redundant network. This topic describes how STP functions.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-8

Spanning Tree Protocol

The solution to loops is STP, which manages the physical paths to given network segments. STP provides for physical path redundancy, while preventing the undesirable effects of active loops in the network. STP is on by default on Catalyst switches.

STP behaves as follows:

STP forces certain ports into a standby state so they do not listen to, forward, or flood data frames. The overall effect is that there is only one path to each network segment active at any time.

If there is a problem with connectivity to any of the segments within the network, STP will reestablish connectivity by automatically activating a previously inactive path, if one exists.

Note Spanning Tree Protocol is covered in further detail in Interconnecting Cisco Networking Devices Part 2 (ICND2).

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 311: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Ethernet LANs 2-101

Summary This topic summarizes the key points that were discussed in this lesson.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-9

Summary

Switched LANs provide microsegmentation, which means that each device on a network segment is connected directly to a switch port and receives its own bandwidth; each device does nothave to contend for bandwidth with any other device on the network. Half-duplex communication in an Ethernet LAN allows data transmission in only one direction at a time (either sending or receiving); full-duplex communication allows both sending and receiving of data simultaneously. Switches provide full-duplex communication capability. Employing a hierarchy of Ethernet connectivity is usually the most efficient way to provide speed where it will be most effective in a campus network, implementing Fast Ethernet and Gigabit Ethernet primarily in workgroup and backbone connections.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-10

Summary (Cont.)

Loops result when switches connected to the same segment transmit the same data. The data frames circulate between the two paths without being removed from the network and may cause inaccurate data in the MAC address tables.The solution to loops is STP, which manages the paths to given network segments. STP provides path redundancy in an Ethernet LAN while preventing undesirable active loops in the network.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 312: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

2-102 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 313: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

Lesson 8

Troubleshooting Switch Issues

Overview Most issues that affect the switched network are encountered during the original implementation. Theoretically, once installed, a network will continue to operate without issues. However, that is only true in theory. Things change; cabling gets damaged, configurations change, new devices are connected to the switch that require switch configuration changes. Ongoing maintenance is a fact of life.

Objectives Upon completing this lesson, you will be able to identify and resolve common switch network issues. This ability includes being able to meet these objectives:

Describe troubleshooting switch issues using a layered approach

Identify and resolve common switched network media issues

Identify and resolve common access port issues

Identify and resolve common configuration issues

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 314: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

2-104 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

Using a Layered Approach This topic describes using a layered approach to identify common switched issues.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-2

The Layered Approach

Switches operate at Layer 2 of the OSI model.Switches provide an interface with the physical media.Problems generally are seen at Layer 1 and Layer 2. Layer 3 issues could arise related to access to the management functions of the switch.

Switches operate at Layer 1 of the Open Systems Interconnection (OSI) model, providing an interface to the physical media. Switches also operate at Layer 2 of the OSI model, providing switching frames based upon MAC addresses. Therefore, problems generally are seen at Layer 1 and Layer 2. Some Layer 3 issues could also result, regarding IP connectivity to the switch for management purposes.

Note Troubleshooting Layer 3 issues will be covered in detail in the “LAN Connections” module.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 315: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Ethernet LANs 2-105

Identifying and Resolving Media Issues This topic describes methods of identifying and resolving common switched network media issues.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-3

Switched Media Issues

Media issues have several possible sources:Wiring gets damaged.New EMI sources are introduced.Traffic patterns change. New equipment is installed.

Media issues are common. It is a fact of life that wiring gets damaged. These are some examples of everyday situations that can cause media issues:

In an environment using Category 3 wiring, maintenance installs a new air conditioning system that introduces new electromagnetic interference (EMI) sources into the environment.

In an environment using Category 5 wiring, cabling is run too close to an elevator motor.

Poor cable management puts strain on RJ-45 connectors, causing one or more wires to break.

New applications can change traffic patterns.

Something as simple as a user connecting a hub to the switch port in an office so he or she can connect a second PC can cause a jump in collisions.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 316: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

2-106 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-4

show interface SwitchX#show interface fastethernet 0/0

Ethernet 0 is up, line protocol is up

Hardware is MCI Ethernet, address is aa00.0400.0134 (via 0000.0c00.4369

Internet address is 131.108.1.1, subnet mask is 255.255.255.0

.

.

Output Omitted

.

.

2295197 packets input, 305539992 bytes, 0 no buffer

Received 1925500 broadcasts, 0 runts, 0 giants

3 input errors, 3 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort

0 input packets with dribble condition detected

3594664 packets output, 436549843 bytes, 0 underruns

8 output errors,

1790 collisions,

10 interface resets,

0 restarts

Fastethernet 0/0 is up, line protocol is up [1]

3 input errors, 3 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort [2]

8 output errors, [3]

1790 collisions, [4]

0 restarts [5]

Damaged wiring and EMI commonly show up as excessive collisions and noise. Changes in traffic patterns and the installation of a hub will show up as collisions and runt frames. These symptoms are best viewed using the show interface command. The following table explains what the highlighted fields in the figure indicate.

Callout Field Description

1 Interface and line protocol status

Indicates whether the interface hardware is currently active or whether it has been disabled by an administrator. If the interface is shown as "disabled," the device has received more than 5,000 errors in a keepalive interval, which is 10 seconds by default. If the line protocol is shown as "down" or "administratively down," the software processes that handle the line protocol consider the interface unusable (because of unsuccessful keepalives) or the interface has been disabled by an administrator.

2 Input errors, including cyclic redundancy check (CRC) errors and framing errors

Total number of errors related to no buffer, runt, giant, CRC, frame, overrun, ignored, and abort. Other input-related errors can also increment the count, so this sum might not balance with the other counts.

3 Output errors Number of times that the receiver hardware was unable to hand received data to a hardware buffer because the input rate exceeded the receiver's ability to handle the data.

4 Collisions Number of messages retransmitted because of an Ethernet collision. This is usually the result of an overextended LAN. LANs can become overextended when an Ethernet or transceiver cable is too long or when there are more than two repeaters between stations.

5 Restarts Number of times that an Ethernet controller has been restarted because of errors.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 317: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Ethernet LANs 2-107

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-5

Excessive Noise

Suggested steps:Use the show interface ethernet EXEC command to determine the status of the device Ethernet interfaces. The presence of many CRC errors but not many collisions is an indication of excessive noise.Inspect the cables for damage.If you are using 100Base-TX, make sure you are using Category 5 cabling.

When you are troubleshooting issues related to excessive noise, three steps are suggested to help isolate and resolve the issue:

Use the show interface ethernet EXEC command to determine the status of the Ethernet interfaces of the device. The presence of many CRC errors but not many collisions is an indication of excessive noise.

Inspect the cables for damage.

If you are using 100Base-TX, make sure you are using Category 5 cabling.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 318: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

2-108 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-6

Excessive Collisions

Suggested steps:Use the show interface ethernet command to check the rate of collisions. The total number of collisions with respect to the total number of output packets should be 0.1 percent or less.Use a time-domain reflectometer (TDR) to find any unterminated Ethernet cables. A TDR is a device that sends signals through a network medium to check cable continuity and other attributes.Look for a jabbering transceiver attached to a host. This might require host-by-host inspection or the use of a protocol analyzer. Jabber occurs when a device that is experiencing circuitry or logic failure continuously sends random (garbage) data.

When you are troubleshooting issues related to excessive collisions, three steps are suggested to help isolate and resolve the issue:

Use the show interface ethernet command to check the rate of collisions. The total number of collisions compared to the total number of output packets should be 0.1 percent or less.

A time-domain reflectometer (TDR) is a device that sends signals through a network medium to check cable continuity and other attributes. Use a TDR to find any unterminated Ethernet cables.

Jabber occurs when a device that is experiencing circuitry or logic failure continuously sends random (garbage) data. Look for a jabbering transceiver attached to a host. This might require host-by-host inspection or the use of a protocol analyzer.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 319: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Ethernet LANs 2-109

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-7

Late Collisions

Suggested steps:Use a protocol analyzer to check for late collisions. Late collisions should never occur in a properly designed Ethernet network. Theyusually occur when Ethernet cables are too long or when there are too many repeaters in the network.Verify that the distance between the first and last host on the segment is within specification.

When you are troubleshooting issues related to excessive late collisions, two steps are suggested to help isolate and resolve the issue:

Use a protocol analyzer to check for late collisions. Late collisions should never occur in a properly designed Ethernet network. They usually occur when Ethernet cables are too long or when there are too many repeaters in the network.

Verify that the distance between the first and last host on the segment is within the specification.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 320: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

2-110 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

Identifying and Resolving Common Access Port Issues

This topic describes methods of identifying and resolving common port access issues.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-8

Port Access Issues

Media-related issuesDuplex-related issuesSpeed-related issues

Media related issues may be reported as an access issue (e.g., the user may say “I can’t access the network”). Media issues should be isolated and resolved as indicated in the previous topic. Duplex-related issues result from a mismatch in duplex settings. Speed-related issues result from a mismatch in speed settings.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 321: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Ethernet LANs 2-111

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-9

Duplex modes:One end set to full and the other set to half results in a mismatch.One end set to full and autonegotiation set on the other end:– Autonegotiation fails, and that end reverts to half.– Results in a mismatch.

One end set to half and autonegotiation set on the other:– Autonegotiation fails, and that end reverts to half.– Both ends at half; no mismatch.

Autonegotiation on both ends:– One end fails to full, and the other end fails to half.– Example: A Gigabit Ethernet interface defaults to full, while a

10/100 defaults to half.Autonegotiation on both ends:– Autonegotiation fails on both ends, and they revert to half.– Both end at half; no mismatch.

Duplex-Related Issues

Use the show interface command to verify the duplex settings.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-10

Duplex modes:One end set to one speed and the other set to another, resultingin a mismatch.One end set to a higher speed and autonegotiation enabled on the other end.– If autonegotiation fails, the autonegotiation end reverts to its

lowest speed.– Results in a mismatch.

Autonegotiation on both ends:– Autonegotiation fails on both ends, and they revert to their

lowest speed.– Both end at half; no mismatch.

Speed-Related Issues

Use the show interface command to verify the duplex settings.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 322: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

2-112 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

Identifying and Resolving Common Configuration Issues

This topic describes methods of identifying and resolving common configuration issues.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-11

Configuration Issues

Know what you have before you start.– Hard copy– Text file– TFTP server

Verify changes before you save.– Confirm that the issue was corrected and no new issues were

created.Save the current configuration.– copy running-config start-config

Secure the configuration.– Password-protect the console.– Password-protect the vty.– Password-protect EXEC mode.

You should always know what you have before you start with device configuration, hardware, and topology. Once you have a working configuration, keep a copy. For example, keep both a hard copy and an electronic copy—a text file on a PC or a copy stored on a TFTP server.

When you are making changes, before saving the running configuration, verify that the changes accomplish what you wanted and do not cause unexpected issues.

Changes made by an unauthorized person, whether malicious or not, can be disastrous. To ensure that you have secured the configuration, have both the console and vty ports protected by a strong password. Also ensure that a strong password has been enabled on the EXEC mode.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 323: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Ethernet LANs 2-113

Summary This topic summarizes the key points that were discussed in this lesson.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-12

Summary

Use a layered approach to troubleshooting. Use the show interface command to troubleshoot these issues:– Media issues– Duplex issues – Speed issues

Keep a copy of configurations and protect the running configuration.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 324: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

2-114 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 325: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Ethernet LANs 2-115

Module Summary This topic summarizes the key points that were discussed in this module.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-1

Module SummaryEthernet cables and segments can span only a limited physical distance, but there are devices, such as repeaters and hubs, that can be added to an Ethernet LAN to extend segments. Bridges and switches divide a LAN into multiple segments. However, switches operate at much higher speeds and support more advanced functionality, performing three major functions in segmenting an Ethernet network: forwarding, filtering, and flooding.There are a number of ways in which the performance benefits of switched Ethernet LANs can be enhanced, including microsegmentation and connectivity hierarchies; however, there is the potential for intentional or unintentional physicalloops that can be solved by STP.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—2-2

Module Summary (Cont.)The Cisco IOS CLI is used to communicate the configuration details that implement the network requirements of an organization.The startup of a Cisco Catalyst switch requires verifying the physical installation, powering up the switch, and viewing the Cisco IOS Software output on the console. The CLI is used to configure the switch name and passwords and to enter console commands such as router interfaces and IP addresses. Increase switch security by enabling password and port securityMost port access problems can be verified using the show interface command.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 326: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

2-116 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

Module Self-Check Use the questions here to review what you learned in this module. The correct answers and solutions are found in the Module Self-Check Answer Key.

Q1) Which two statements about the functions of a hub are accurate? (Choose two.) (Source: Understanding the Challenges of Shared LANs) A) A hub extends an Ethernet LAN. B) A hub reduces the size of a collision domain. C) Adding a hub eliminates the need for users on a network segment to compete

for the same bandwidth. D) A hub is a data link layer device. E) A hub amplifies the data signal before retransmitting it.

Q2) Which three statements best describe collisions? (Choose three.) (Source: Understanding the Challenges of Shared LANs) A) Collisions occur when two or more stations on a shared media transmit at the

same time. B) Larger segments are less likely to have collisions. C) In a collision, the frames are destroyed, and each station in the segment begins

a random timer that must be completed before attempting to retransmit the data.

D) Adding a hub to a network can improve collision issues. E) Collisions are by-products of a shared LAN. F) More segments on a network mean greater potential for collisions.

Q3) Which of these choices best describes a collision domain? (Source: Understanding the Challenges of Shared LANs) A) two or more devices trying to communicate at the same time B) two networks that are connected C) network segments that share the same bandwidth D) none of the above

Q4) What type of hardware will help eliminate collisions? (Source: Solving Network Challenges with Switched LAN Technology) A) repeater B) bridge C) hub D) extender

Q5) Which three factors are typical causes of network congestion? (Choose three.) (Source: Solving Network Challenges with Switched LAN Technology) A) high-bandwidth applications B) many network segments C) increasing volume of network traffic D) more powerful computer and network technologies E) few network segments F) greater distances for LANs

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 327: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Ethernet LANs 2-117

Q6) What are three characteristics of a bridge? (Choose three.) (Source: Solving Network Challenges with Switched LAN Technology) A) Bridges forward but do not filter data frames between LAN segments. B) Bridges maintain MAC address tables. C) Bridges are more “intelligent” than hubs. D) Bridges can buffer and forward frames between two or more LAN segments. E) Bridges create fewer collision domains. F) Bridges operate at Layer 2 of the OSI model.

Q7) What are two major benefits of adding a bridge to a network? (Choose two.) (Source: Solving Network Challenges with Switched LAN Technology) A) isolating potential network problems to specific segments B) increasing the speed of a network C) extending a LAN to cover greater distances by joining multiple segments D) creating fewer collision domains E) forwarding data frames between LAN segments

Q8) Match each term related to the operation of a switch in a network to its description. (Source: Solving Network Challenges with Switched LAN Technology)

_____ 1. If the switch determines that the destination MAC address of the frame resides on the same network segment as the source, it does not forward the frame.

_____ 2. If the switch determines that the destination MAC address of the frame is not from the same network as the source, it transmits the frame to the appropriate segment.

_____ 3. If the switch does not have an entry for the destination address, it will transmit the frame out of all ports except the port on which it received the frame.

A) flooding B) filtering C) forwarding

Q9) Which three characteristics apply to a switch? (Choose three.) (Source: Solving Network Challenges with Switched LAN Technology) A) uses a table of MAC addresses to determine the port to which the data is to be

sent B) connects LAN segments C) reduces the number of collision domains D) increases the number of collision domains E) filters data before forwarding it to its destination on the network

Q10) Which three features differentiate switches from bridges? (Choose three.) (Source: Solving Network Challenges with Switched LAN Technology) A) large frame buffers B) use of a table of MAC addresses to determine the segment to which the data is

to be sent C) support for mixed media rates D) high port densities E) ability to segment LANs

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 328: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

2-118 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

Q11) Which three statements are accurate about how the network performance of a switch compares to that of a bridge? (Choose three.) (Source: Solving Network Challenges with Switched LAN Technology) A) Switches operate at much higher speeds than bridges. B) Switches operate at lower speeds than bridges. C) Switches support more advanced functionality than bridges. D) Switches support less functionality than bridges. E) Switches support dedicated communication between devices. F) Switches do not support dedicated communication between devices.

Q12) Which three statements about microsegmentation are accurate? (Choose three.) (Source: Maximizing the Benefits of Switching) A) Implementing a bridge creates microsegmentation. B) Microsegmentation increases bandwidth availability. C) Each device on a network segment is connected directly to a switch port. D) Microsegmentation eliminates collisions. E) Microsegmentation limits the number of segments on a network. F) Microsegmentation uses half-duplex operation.

Q13) Match each function description with either full-duplex or half-duplex communication. (Source: Maximizing the Benefits of Switching)

_____ 1. The network sends and receives data frames one at a time, but not simultaneously.

_____ 2. This communication type effectively doubles the amount of bandwidth between the devices.

_____ 3. The network sends and receives data frames simultaneously. A) full-duplex communication B) half-duplex communication

Q14) Match each connectivity function to the appropriate Ethernet type. (Source: Maximizing the Benefits of Switching)

_____ 1. at the end-user level, gives high-performance, PC workstation 100-Mb/s access to a server

_____ 2. not typically used at the end-user level; at the workgroup level, provides connectivity between the end user and workgroups at the backbone level, provides interswitch connectivity for low- to medium-volume applications

_____ 3. at the workgroup level, provides high-performance connectivity to the enterprise server

_____ 4. at the backbone level, provides backbone and interswitch connectivity _____ 5. at the end-user level, provides connectivity between the end user and the

user-level switch _____ 6. provides interswitch connectivity for low- to medium-volume applications A) Ethernet 10BASE-T B) Fast Ethernet C) Gigabit Ethernet

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 329: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Ethernet LANs 2-119

Q15) When a Cisco device starts up, which of the following does it run to check its hardware? (Source: Operating Cisco IOS Software) A) flash B) RAM C) POST D) TFTP

Q16) When a Catalyst switch or Cisco router starts up, what is the first operation performed? (Source: Operating Cisco IOS Software) A) The device performs system startup routes. B) The device performs hardware checking routines. C) The device attempts to locate other devices on the network. D) The device tries to find and apply software configuration settings.

Q17) Upon initial installation of a Cisco switch or router, the network administrator typically configures the networking devices from a _____. (Source: Operating Cisco IOS Software) A) CD-ROM B) TFTP server C) console terminal D) modem connection

Q18) If a network administrator is supporting a remote device, the preferred method is to use a modem connection to the _____ of the device for remote configuration. (Source: Operating Cisco IOS Software) A) LAN port B) uplink port C) console port D) auxiliary port

Q19) Which access level allows a person to access all router commands and can be password protected to allow only authorized individuals to access the router? (Source: Operating Cisco IOS Software) A) user EXEC level B) setup EXEC level C) enable EXEC level D) privileged EXEC level

Q20) How do you instruct a Cisco device to parse and execute an entered command? (Source: Operating Cisco IOS Software) A) Press the Send key. B) Press the Enter key. C) Add a space at the end of the command. D) Wait 5 seconds after you enter a command.

Q21) Which CLI prompt indicates that you are working in privileged EXEC mode? (Source: Operating Cisco IOS Software) A) hostname# B) hostname> C) hostname-exec> D) hostname-config

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 330: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

2-120 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

Q22) Which command would you enter in the privileged EXEC mode to list the command options? (Source: Operating Cisco IOS Software) A) ? B) init C) help D) login

Q23) Match each step of the physical Catalyst switch startup process to its description. (Source: Starting a Switch)

_____ 1. Step 1 _____ 2. Step 2 _____ 3. Step 3 A) Attach the power cable plug to the switch power supply socket. B) Observe the boot sequence, including the Cisco IOS software output text on the

console. C) Verify that all cable connections are secure, the terminal is connected to the

console port, and the console terminal application is selected.

Q24) How do you start a Catalyst 2950 series switch? (Source: Starting a Switch) A) Press the on/off switch. B) Power up the redundant power supply. C) Connect a network cable to another switch on the network. D) Attach the power cable plug to the switch power supply socket.

Q25) If the POST tests complete successfully on a Catalyst switch, what display could you see on the console? (Source: Starting a Switch) A) the > prompt B) the privileged EXEC prompt C) the Management Console logon screen D) a list of commands available on the switch

Q26) What CLI command should you enter to display a list of commands that begin with the letter “c” on a Catalyst switch? (Source: Starting a Switch) A) c? B) c ? C) help c D) help c*

Q27) What CLI command should you enter to display the command syntax help so that you can see how to complete a command that begins with config? (Source: Starting a Switch) A) config? B) config ? C) help config D) help config*

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 331: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Ethernet LANs 2-121

Q28) Which Cisco IOS command correctly configures an IP address and subnet mask on a switch? (Source: Starting a Switch) A) ip address B) ip address 196.125.243.10 C) 196.125.243.10 ip address D) ip address 196.125.243.10 255.255.255.0

Q29) Which configuration mode will you use to configure a particular port on a switch? (Source: Starting a Switch) A) user mode B) global configuration mode C) interface configuration mode D) controller configuration mode

Q30) When you use the show interface command to display the status and statistics for the interfaces configured on a Catalyst switch, which output field indicates the MAC address that identifies the interface hardware? (Source: Starting a Switch) A) MTU 1500 bytes B) Hardware is … 10BaseT C) Address is 0050.BD73.E2C1 D) 802.1d STP State: Forwarding

Q31) Which show command requires that you have privileged EXEC mode access? (Source: Starting a Switch) A) show ip B) show version C) show running D) show interfaces

Q32) How should you power up a Cisco router? (Source: Starting a Switch) A) Press the Reset button. B) Turn the power switch to “on.” C) Connect the fiber cable to another router. D) Attach the power cable plug to the router power supply socket.

Q33) Which of two the following would be considered a physical threat? (Choose two.) (Source: Switch Security) A) A user leaving a password in his or her desk. B) Someone turning off the power to the switch to block network access. C) Someone turning off the air conditioning system in the network closet. D) Someone breaking into the cabinet that contains the network documentation.

Q34) Which four of the following can be protected with a password? (Choose four.) (Source: Switch Security) A) Console access B) VTY access C) TTY access D) User level access E) Exec level access

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 332: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

2-122 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

Q35) Which of the following is customized text that is displayed before the username and password login prompts? (Source: Switch Security) A) message of the day B) login banner C) access warning D) user banner E) warning message

Q36) Which of the following is the most secure method of remotely accessing a network device? (Source: Switch Security) A) HTTP B) Telnet C) SSH D) RMON E) SNMP

Q37) Which of the following is a Cisco IOS feature that can be used to control access to the vty ports? (Source: Switch Security) A) shutdown B) port security C) access list D) firewall

Q38) Which of the following is a Cisco IOS command that can be used to control access to a switch port based upon a MAC address? (Source: Switch Security) A) shutdown B) port security C) mac-secure D) firewall

Q39) Which of the following is a Cisco IOS command that can be used to increase the security of unused switch ports? (Source: Switch Security) A) shutdown B) port security C) mac-secure D) firewall

Q40) Which problem is caused by redundant connections in a network? (Source: Maximizing the Benefits of Switching) A) microsegmentation B) loops C) degradation D) collisions

Q41) Which statement best describes how loops can affect performance in a switched LAN? (Source: Maximizing the Benefits of Switching) A) Broadcast storms may be created when loops occur, preventing data from

being transmitted over the network. B) Any multicast, broadcast, or unknown traffic will be flooded out to all ports. C) Incorrect information may be updated to the MAC address tables, resulting in

inaccurate forwarding of frames. D) The loop removes the frame from the network.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 333: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Ethernet LANs 2-123

Q42) Which statement accurately describes Spanning-Tree Protocol? (Source: Maximizing the Benefits of Switching) A) STP assigns roles to bridges and ports to ensure that only one forwarding path

exists through the network at any given time. B) STP automatically keeps the previously inactive path inactive. C) STP eliminates the segments in which there are problems. D) STP allows ports to listen to, forward, and flood data frames.

Q43) Which of the following is a Cisco IOS command that is the most useful when troubleshooting media issues? (Source: Troubleshooting Switch Issues) A) show controller B) show run C) show interface D) show counters

Q44) Which of the following is a Cisco IOS command that is the most useful when troubleshooting port access issues? (Source: Troubleshooting Switch Issues) A) show controller B) show run C) show interface D) show counters

Q45) Which three of the following are methods used to mitigate configuration issues? (Choose three.) (Source: Troubleshooting Switch Issues) A) Secure unused ports. B) Secure the configuration. C) Verify changes before you save. D) Know what you have before you start.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 334: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

2-124 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

Module Self-Check Answer Key Q1) A, D

Q2) A, C, D

Q3) C

Q4) B

Q5) A, C, D

Q6) B, C, D

Q7) A, C

Q8) 1 = B, 2 = C, 3 = A

Q9) A, B, D

Q10) A, C, D

Q11) A, C, E

Q12) B, C, D

Q13) 1 = B, 2 = A, 3 = A

Q14) 1 = B, 2 = C, 3 = B, 4 = C, 5 = A, 6 = C

Q15) C

Q16) B

Q17) C

Q18) D

Q19) D

Q20) B

Q21) A

Q22) A

Q23) A, C, B

Q24) D

Q25) A

Q26) A

Q27) B

Q28) D

Q29) C

Q30) C

Q31) C

Q32) B

Q33) B, C

Q34) A, B, C, E

Q35) B

Q36) C

Q37) C

Q38) B

Q39) A

Q40) B

Q41) A

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 335: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Ethernet LANs 2-125

Q42) A

Q43) C

Q44) C

Q45) B, C, D

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 336: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

2-126 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 337: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

Module 3

Wireless LANs

Overview Historically, LANs have been limited to physical wired segments. With the advent of technologies that utilized infrared (IR) and radio frequency (RF) to carry data, LANs were freed from the limitations of a physical media. This module describes the reasons for extending the reach of a LAN and the methods that can be used to do so, with a focus on RF wireless access.

Module Objectives Upon completing this module, you will be able to describe the wireless LAN (WLAN) environment. This ability includes being able to meet these objectives:

Describe the business drivers and standards that affect WLAN implementation

Describe WLAN security issues and threat-mitigation methods

Describe the factors that affect WLAN implementation

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 338: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

3-2 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 339: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

Lesson 1

Exploring Wireless Networking

Overview Wireless access to networks has developed like most new technologies: Business needs drive technology developments, which in turn drive new business needs, which in turn drive new technology developments. To keep this cycle from spinning out of control, several organizations have stepped forward to establish wireless LAN (WLAN) standards and certifications. This lesson describes the trends and standards that impact WLAN development.

Objectives Upon completing this lesson, you will be able to describe the factors that affect WLANs and the standards that govern WLANs. This ability includes being able to meet these objectives:

Describe the business case for WLAN services

Describe the differences between WLAN and LAN implementation

Identify the characteristics of the radio frequency transmissions used by WLANs

Identify the organizations that define WLAN standards

Describe the three unlicensed bands used by ITU-R local FCC wireless

Compare the different IEEE 802.11 standards

Describe Wi-Fi certification

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 340: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

3-4 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

The Business Case for WLAN Service This topic describes the business case for WLAN services.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—3-2

Market Trends

Productivity is no longer restricted to a fixed work location or a defined time period. People now expect to be connected at any time and place, from the office to the airport or even the home. Traveling employees used to be restricted to pay phones for checking messages and returning a few phone calls between flights. Now employees can check e-mail, voice mail, and the web status of products on personal digital assistants (PDAs) while walking to a flight.

Even at home people have changed the way they live and learn. The Internet has become a standard in homes, along with TV and phone service. Even the method of accessing the Internet has quickly moved from temporary modem dialup service to dedicated DSL or cable service, which is always connected and is faster than dialup. In 2005, users of PCs purchased more Wi-Fi enabled mobile laptops than fixed-location desktops.

The most tangible benefit of wireless is the cost reduction. Two situations illustrate the cost savings. First, with a wireless infrastructure already in place, savings are realized when moving a person from one cube to another, reorganizing a lab, or moving from temporary locations or project sites. On average, the IT cost of moving an employee from one cube to another is $375. For the business case, we will assume that 15 percent of the staff is moved every year. The second situation to consider is when a company moves into a new building which does not have any wired infrastructure. In this case, the savings of wireless are even more noticeable, because running cables through walls, ceilings and floors is a labor-intensive process.

Last but not least, another advantage of using a WLAN is the increase in employee satisfaction, leading to less turnover and the cost saving of not hiring as many new employees. Employee satisfaction also results in better customer support, which cannot be easily quantified but is a major benefit.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 341: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Wireless LANs 3-5

Differences Between WLANs and LANs This topic describes the differences between WLAN and LAN implementation.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—3-3

Differences Between WLAN and LAN

WLANs use radio waves as the physical layer.– WLANs use CSMA/CA instead of CSMA/CD for media access.– Two-way radio (half-duplex) communication.

Radio waves have problems that are not found on wires.– Connectivity issues:

Coverage problemsInterference, noise

– Privacy issues Access points are shared devices similar to an Ethernet hub for shared bandwidth.WLANs must meet country-specific RF regulations.

In WLANs, radio frequencies are used as the physical layer of the network.

WLANs use Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) instead of Carrier Sense Multiple Access with Collision Detection (CSMA/CD), which is used by Ethernet LANs. Collision detection is not possible in WLANs, because a sending station cannot receive at the same time that it is transmitting and, therefore, cannot detect a collision. Instead, WLANs use the Ready to Send (RTS) and Clear to Send (CTS) protocols to avoid collisions.

WLANs use a different frame format than wired Ethernet LANs. WLANs require additional information in the Layer 2 header of the frame.

Radio waves cause problems not found in LANs.

Connectivity issues occur in WLANs because of coverage problems, RF transmission, multipath distortion, and interference from other wireless services or other WLANs.

Privacy issues occur because radio frequencies can reach outside the facility.

In WLANs, mobile clients connect to the network through an access point, which is the equivalent of a wired Ethernet hub.

Mobile clients do not have a physical connection to the network.

Mobile devices are often battery powered, as opposed to plugged-in LAN devices.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 342: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

3-6 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

WLANs must meet country-specific RF regulations.

The aim of standardization is to make WLANs available worldwide. Because WLANs use radio frequencies, they must follow country-specific regulations of RF power and frequencies. This requirement does not apply to wired LANs.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 343: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Wireless LANs 3-7

RF Transmission Radio frequencies range from the AM radio band to frequencies used by cell phones. This topic identifies the characteristics of the radio frequency transmissions used by WLANs.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—3-4

Radio Frequency Transmission

Radio frequencies are radiated into the air via an antenna, creating radio waves.Objects can affect radio wave propagation resulting in: – Reflection– Scattering– Absorption

Higher frequencies allow higher data rates; however, they have ashorter range.

Radio frequencies are radiated into the air by antennas that create radio waves. When radio waves are propagated through objects, they may be absorbed (for instance, by walls) or reflected (for instance, by metal surfaces). This absorption and reflection may cause areas of low signal strength or low signal quality.

The transmission of radio waves is influenced by the following factors:

Reflection: Occurs when radio frequency (RF) waves bounce off objects (for example, metal or glass surfaces)

Scattering: Occurs when RF waves strike an uneven surface (for example, a rough surface) and are reflected in many directions

Absorption: Occurs when RF waves are absorbed by objects (for example, walls)

The following rules apply for data transmission over radio waves:

Higher data rates have a shorter range because the receiver requires a stronger signal with a better signal-to-noise ratio (SNR) to retrieve the information.

Higher transmit power results in a greater range. To double the range, the power has to be increased by a factor of 4.

Higher data rates require more bandwidth. Increased bandwidth is possible with higher frequencies or more complex modulation.

Higher frequencies have a shorter transmission range because they have higher degradation and absorption. This problem can be addressed by more efficient antennas.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 344: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

3-8 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

Organizations That Define WLANs Several organizations have stepped forward to establish wireless LAN (WLAN) standards and certifications. This topic identifies the organizations that define WLAN standards.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—3-5

Organizations That Define WLANITU-R:

International Telecommunication Union-Radiocommunication SectorRegulates the RF used in wireless

IEEE:Institute of Electrical and Electronic Engineers802.11 documents wireless technical standards

Wi-Fi Alliance:Global nonprofit industry trade associationPromote wireless growth through interoperability certification

Regulatory agencies control the use of the RF bands. With the opening of the 900-MHz Industrial, Scientific, and Medical (ISM) band in 1985, the development of WLANs started. New transmissions, modulations, and frequencies must be approved by regulatory agencies. A worldwide consensus is required. Regulatory agencies include the Federal Communications Commission (FCC) for the United States (http://www.fcc.gov) and the European Telecommunications Standards Institute (ETSI) for Europe (http://www.etsi.org).

The Institute of Electrical and Electronic Engineers (IEEE) defines standards. IEEE 802.11 is part of the 802 networking standardization process. You can download ratified standards from the IEEE website (http://standards.ieee.org/getieee802).

The Wi-Fi Alliance offers certification for interoperability between vendors of 802.11 products. Certification provides a comfort zone for purchasers of these products. It also helps market WLAN technology by promoting interoperability between vendors. Certification includes all three 802.11 RF technologies and Wi-Fi Protected Access (WPA), a security model released in 2003 and ratified in 2004, based on the new security standard IEEE 802.11i, which was ratified in 2004. The Wi-Fi Alliance promotes and influences WLAN standards. A list of ratified products can be found on the Wi-Fi website (http://www.wi-fi.org).

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 345: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Wireless LANs 3-9

ITU-R Local FCC Wireless There are several unlicensed RF bands. This topic describes the three unlicensed bands used by ITU-R local FCC wireless.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—3-6

ITU-R with FCC Wireless

ISM: industry, scientific, and medical frequency bandNo license required

No exclusive use Best-effortInterference possible

There are three unlicensed bands: 900 MHz, 2.4 GHz, and 5.7 GHz. The 900-MHz and 2.4-GHz bands are referred to as the Industrial, Scientific, and Medical (ISM) bands, and the 5-GHz band is commonly referred to as the Unlicensed National Information Infrastructure (UNII) band.

Frequencies for these bands are as follows:

900-MHz band: 902 MHz to 928 MHz.

2.4-GHz band: 2.400 MHz to 2.483 GHz (In Japan, this band extends to 2.495 GHz).

5-GHz band: 5.150 MHz to 5.350 MHz, 5.725 MHz to 5.825 MHz, with some countries supporting middle bands between 5.350 MHz and 5.725 MHz. Not all countries permit IEEE 802.11a, and the available spectrum varies widely. The list of countries that permit 802.11a is changing.

The figure shows WLAN frequencies. Next to the WLAN frequencies in the spectrum are other wireless services such as cellular phones and narrowband Personal Communication Services (PCS). The frequencies used for WLAN are ISM bands.

A license is not required to operate wireless equipment on unlicensed frequency bands. However, no user has exclusive use of any frequency. For example, the 2.4-GHz band is used for WLANs, video transmitters, Bluetooth, microwave ovens, and portable phones. Unlicensed frequency bands offer best-effort use, and interference and degradation are possible.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 346: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

3-10 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

Even though three frequency bands do not require a license to operate equipment, they still are subject to the local country code regulations inside the frequencies to regulate areas such as transmitter power, antenna gain (which increases the effective power), and the sum of transmitter loss, cable loss, and antenna gain.

Effective Isotropic Radiated Power (EIRP) is the final unit of measurement monitored by local regulatory agencies. Therefore, caution should be used when attempting to replace a component of wireless equipment; for example, when adding or upgrading an antenna to increase range. The possible result could be a WLAN that is illegal under local codes.

EIRP = transmitter power + antenna gain – cable loss

Note Only use antennas and cables supplied by the original manufacturer listed for the specific access point implementation. Only use qualified technicians who understand the many requirements of the RF regulatory codes for that country.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 347: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Wireless LANs 3-11

802.11 Standards Comparison This topic compares the different 802.11 standards.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—3-7

IEEE 802.11 Standards Comparison

6, 9, 12, 18, 24, 36, 48, 54

Orthogonal Frequency

Division Multiplexing

(OFDM)

Up to 23

5 GHz

802.11a

1, 2, 5.5, 11

Direct Sequence

Spread Spectrum (DSSS)

3

2.4 GHz

802.11b

3No. of channels

6, 9, 12, 18, 24, 36, 48, 54

Orthogonal Frequency

Division Multiplexing

(OFDM)

2.4 GHz

1, 2, 5.5, 11Data rates[Mb/s]

Direct Sequence

Spread Spectrum (DSSS)

Transmission

Frequencyband

802.11g

IEEE standards define the physical layer, and the MAC sub-layer of the data link layer, of the OSI model. The original 802.11 wireless standard was completed in June 1997. It was revised in 1999 to create IEEE 802.11a/b, then reaffirmed in 2003 as IEEE 802.11g.

By design, the standard does not address the upper layers of the OSI model. IEEE 802.11b was defined using Direct Sequence Spread Spectrum (DSSS). DSSS uses just one channel that spreads the data across all frequencies defined by that channel.

IEEE 802.11 divided the 2.4-GHz ISM band into 14 channels, but local regulatory agencies such as the FCC designate which channels are allowed, such as channels 1 through 11 in the United States. Each channel in the 2.4-GHz ISM band is 22-MHz wide with 5-MHz separation, resulting in overlap with channels before or after a defined channel. Therefore, a separation of five channels is needed to ensure unique nonoverlapping channels. For example, using the 11 FCC channels, there are three nonoverlapping channels: 1, 6, and 11.

Recall that wireless uses half-duplex communication, so the basic throughput is only about half of the data rate. Because of this, the IEEE 802.11b main development goal was to achieve higher data rates within the 2.4-GHz ISM band in order to continue to increase the Wi-Fi consumer market and encourage consumer acceptance of Wi-Fi.

802.11b defined the usage of DSSS with newer encoding or modulation of Complementary Code Keying (CCK) for higher data rates of 5.5 and 11 Mb/s while retaining Barker coding of 1 and 2 Mb/s. 802.11b still uses the same 2.4-GHz ISM band as prior 802.11 standards, making it backward-compatible with the prior 802.11 standard and its associated data rates of 1 and 2 Mb/s.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 348: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

3-12 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

The year that the 802.11b standard was adopted, IEEE developed another standard known as 802.11a. This standard was motivated by the goal of increasing data rates by using a different Orthogonal Frequency Division Multiplexing (OFDM) spread spectrum and modulation technology and using the less crowded frequency of 5-GHz UNII. The 2.4-GHz ISM band was widely used for all WLAN devices, such as Bluetooth, cordless phones, monitors, video, and home gaming consoles, and it also happens to be the same frequency used by microwave ovens. The 802.11a standard was not as widely accepted because materials needed to manufacture chips that supported 802.11a were less readily available and initially resulted in higher cost. Most applications satisfied the requirements for wireless support by following the cheaper and more accessible standards of 802.11b.

A more recent development by IEEE maintains usage of the 802.11 MAC and obtains higher data rates in the 2.4-GHz ISM band. The IEEE 802.11g amendment uses the newer OFDM from 802.11a for higher speeds, yet is backward-compatible with 802.11b using DSSS, which was already using the same ISM frequency band. DSSS data rates of 1, 2, 5.5, and 11 Mb/s are supported, as are OFDM data rates of 6, 9, 12, 18, 24, 48, and 54 Mb/s. IEEE requires only the mandatory data rate of 6, 12, and 24 Mb/s, regardless whether a device is supporting 802.11a or 802.11g OFDM.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 349: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Wireless LANs 3-13

Wi-Fi Certification Even after the 802.11 standards were established, there was a need to ensure interoperability among 802.11 products. This topic describes how Wi-Fi certification ensures interoperability.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—3-8

Wi-Fi Certification

Wi-Fi Alliance certifiesinteroperability between products.

Products include 802.11a, 802.11b, 802.11g, dual-band products, and security testing.Provides assurance to customers of migration and integration options.

Cisco is a founding member of the Wi-Fi Alliance.Certified products can be found athttp://www.wi-fi.com.

The Wi-Fi Alliance is a global, nonprofit industry trade association devoted to promoting the growth and acceptance of WLANs. One of the primary benefits of the Wi-Fi Alliance is to ensure interoperability among 802.11 products offered by various vendors, by providing certification. Certified vendor interoperability provides a comfort zone for purchasers. Certification includes all three IEEE 802.11 RF technologies, as well as early adoption of pending IEEE drafts, such as one addressing security. The Wi-Fi Alliance adapted IEEE 802.11i draft security as Wi-Fi Protected Access (WPA), then revised it to WPA2 after final release of IEEE 802.11i.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 350: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

3-14 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

Summary This topic summarizes the key points that were discussed in this lesson.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—3-9

Summary

People now expect to be connected at any time and place. However, the most tangible benefit of wireless is the cost reduction.Both WLANs and LAN use CSMA. However WLANs use collision avoidance while LANs use collistion detection.Radio frequencies are radiated into the air by antennas, where they are affected by reflection, scattering, and absorption.The IEEE defines the 802.11 standards.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—3-10

Summary (Cont.)

The ITU-R local FCC wireless bands are unlicensed.The 802.11 standards are a set of standards that define the frequencies and radio bands for WLANs.One of the primary benefits of the Wi-Fi Alliance is to ensure interoperability among 802.11 products.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 351: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

Lesson 2

Understanding WLAN Security

Overview The most tangible benefit of wireless is cost reduction: In addition to increasing productivity, wireless LANs (WLANs) increase work quality. However, a security breach resulting from a single unsecured access point can negate hours spent securing the corporate network and even ruin an organization. It is important to understand the security risks of WLANs and how to reduce those risks.

Objectives After completing this lesson, you will be able to describe WLAN security issues and the features available to increase WLAN security. This ability includes being able to meet these objectives:

Describe common threats to WLAN services

Describe methods of mitigating security threats to WLAN services

Describe the evolution of WLAN security

Describe the wireless client association process

Describe how IEEE 802.1X provides additional WLAN security

Describe the modes of WPA

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 352: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

3-16 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

WLAN Security Threats This topic describes common threats to WLAN services.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—3-2

Wireless LAN Security Threats

With the lower costs of IEEE 802.11b/g systems, it is inevitable that hackers will have many more unsecured WLANs from which to choose. Incidents have been reported of people using numerous open source applications to collect and exploit vulnerabilities in the IEEE 802.11 standard security mechanism, Wired Equivalent Privacy (WEP). Wireless sniffers enable network engineers to passively capture data packets so that they can be examined to correct system problems. These same sniffers can be used by hackers to exploit known security weaknesses.

“War driving” originally meant using a cellular scanning device to find cell phone numbers to exploit. War driving now also means driving around with a laptop and an 802.11b/g client card to find an 802.11b/g system to exploit.

Most wireless devices sold today are WLAN-ready. End users often do not change default settings or they implement only standard WEP security, which is not optimal for securing wireless networks. With basic WEP encryption enabled (or, obviously, with no encryption enabled), it is possible to collect data and obtain sensitive network information, such as user login information, account numbers, and personal records.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 353: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Wireless LANs 3-17

A rogue access point is an access point placed on a WLAN and used to interfere with normal network operations; for example, with denial of service (DoS) attacks. If a rogue access point is programmed with the correct WEP key, client data could be captured. A rogue access point also could be configured to provide unauthorized users with information such as MAC addresses of clients (both wireless and wired), or to capture and spoof data packets, or, at worst, to gain access to servers and files. A simple and common version of a rogue access point is one installed by employees with authorization. Employees install access points intended for home use without the necessary security configuration on the enterprise network, causing a security risk for the network.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 354: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

3-18 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

Mitigating Security Threats This topic describes how to mitigate security threats to a WLAN service.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—3-3

Mitigating the Threats

Track and mitigate unauthorized access and network attacks.

Protect data as it is transmitted and

received.

Ensure that legitimate clients associate with trusted access points.

Intrusion Prevention System (IPS)EncryptionAuthentication

Protection and Availability

Privacy and ConfidentialityControl and Integrity

To secure a WLAN, the following steps are required:

Authentication, to ensure that legitimate clients and users access the network via trusted access points

Encryption, to provide privacy and confidentiality

Intrusion detection systems (IDSs) and intrusion prevention systems (IPSs), to protect from security risks and availability

The fundamental solution for wireless security is authentication and encryption to protect the wireless data transmission. These two wireless security solutions can be implemented in degrees; however both apply to both small office, home office (SOHO) and large enterprise wireless networks. Larger enterprise networks will need the additional levels of security offered by an IPS monitor. Current IPSs can not only detect wireless network attacks but also provide basic protection against unauthorized clients and access points. Many enterprise networks use IPSs for protection not primarily against outside threats, but mainly against unintentionally unsecured access points installed by employees desiring the mobility and benefits of wireless.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 355: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Wireless LANs 3-19

Evolution of WLAN Security Almost as soon as the first WLAN standards were established, hackers began trying to exploit weaknesses. To counter this threat, WLAN standards evolved to provide more security. This topic describes the evolution of WLAN security.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—3-4

WEP

Basic encryption

No strong authentication

Static, breakable keys

Not scalable

MAC filters and SSID-cloaking also used to complement WEP

Evolution of Wireless LAN Security

1997 2001

802.1x EAP

Dynamic keys

Improved encryption

Userauthentication

802.1X EAP (LEAP, PEAP)

RADIUS

2003

WPA

Standardized

Improved encryption

Strong, user authentication (such as, LEAP, PEAP, EAP-FAST)

2004 to Present

802.11i / WPA2

AES strong encryption

Authentication

Dynamic key management

The figure shows the evolution of WLAN security.

Initially, 802.11 security defined only 64-bit static WEP keys for both encryption and authentication. The 64-bit key contained the actual 40-bit key plus a 24-bit initialization vector. The authentication method was not strong, and the keys were eventually compromised. Because the keys were administered statically, this method of security was not scalable to large enterprise environments. Companies tried to counteract this weakness with techniques such as Service Set Identifier (SSID) and MAC address filtering.

The SSID is a network-naming scheme and configurable parameter that both the client and the access point must share. If the access point is configured to broadcast its SSID, the client associates with the access point .using the SSID advertised by the access point. An access point can be configured to not broadcast the SSID (SSID cloaking) to provide a first level of security. The belief was that if the access point did not advertise itself, it would be harder for hackers to find it. To allow the client to learn the access point SSID, 802.11 allows wireless clients to use a null string (no value entered in the SSID field), thereby requesting that the access point broadcast its SSID. However, this technique renders the security effort ineffective because hackers need only send a null string until they find an access point. Access points also supported filtering using a MAC address. Tables are manually constructed on the access point to allow or disallow clients based on their physical hardware address. However, MAC addresses are easily spoofed, and MAC address filtering is not considered a security feature.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 356: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

3-20 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

While 802.11 committees began the process of upgrading WLAN security, enterprise customers needed wireless security immediately to enable deployment. Driven by customer demand, Cisco introduced early proprietary enhancements to RC4-based WEP encryption. Cisco implemented Temporal Key Integrity Protocol (TKIP) per-packet keying or hashing and Cisco Message Integrity Check (Cisco MIC) to protect WEP keys. Cisco also adapted 802.1X wired authentication protocols to wireless and dynamic keys using Cisco Lightweight Extensible Authentication Protocol (Cisco LEAP) to a centralized database.

Soon after Cisco wireless security implementation, the Wi-Fi Alliance introduced Wi-Fi Protected Access (WPA) as an interim solution that was a subset of the expected IEEE 802.11i security standard for WLANs using 802.1X authentication and improvements to WEP encryption. The newer key-hashing TKIP has features similar to those provided by Cisco Key Integrity Protocol and message integrity check (MIC) but these three security implementations are not compatible.

Today 802.11i has been ratified and Advanced Encryption Standard (AES) has replaced WEP as the latest and most secure method of encrypting data. Wireless IDSs are available to identify attacks and protect the WLAN from them. The Wi-Fi Alliance certifies 802.11i devices under Wi-Fi Protected Access 2 (WPA2).

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 357: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Wireless LANs 3-21

Wireless Client Association This topic describes the wireless client association process.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—3-5

Wireless Client Association

Access points send out beacons announcing SSID, data rates, and other information.Client scans all channels.Client listens for beacons and responses from access points.Client associates to access point with strongest signal.Client will repeat scan if signal becomes low to reassociate to another access point (roaming).During association, SSID, MAC address, and security settings are sent from the client to the access point and checked by the access point.

In the client association process, access points send out beacons announcing one or more SSIDs, data rates, and other information. The client scans all the channels and listens for beacons and responses from the access points. The client associates to the access point that has the strongest signal. If the signal becomes low, the client repeats the scan to associate with another access point (this process is called roaming). During association, the SSID, MAC address, and security settings are sent from the client to the access point and checked by the access point.

The association of a wireless client to a selected access point is actually the second step in a two-step process. First authentication, then association, must occur before an 802.11 client can pass traffic through the access point to another host on the network. Client authentication in this initial process is not the same as network authentication (entering username and password to get access to the network). Client authentication is simply the first step (followed by association) between the wireless client and access point, and simply establishes communication. The 802.11 standard specified only two different methods of authentication, open authentication and shared key authentication. Open authentication is simply the exchange of four hello-type packets with no client or access point verification, to allow ease of connectivity. Shared key authentication uses a static defined WEP key, known between the client and access point, for verification. This same key may or may not be used to encrypt the actual data passing between a wireless client and an access point based on user configuration.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 358: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

3-22 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

How 802.1X Works on WLANs This topic describes how 802.1X provides additional WLAN security.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—3-6

How 802.1X Works on the WLAN

The access point, acting as the authenticator at the enterprise edge, allows the client to associate using open authentication. The access point then encapsulates any 802.1X traffic bound for the authentication server and sends it to the server. All other network traffic is blocked, meaning that all other attempts to access network resources are blocked.

Upon receiving RADIUS traffic bound for the client, the access point encapsulates it and sends the information to the client. Although the server authenticates the client as a valid network user, this process allows the client to validate the server as well, ensuring that the client is not logging into a phony server.

While an enterprise network will use a centralized authentication server, smaller offices or business might simply use the access point with preshared keys as the authentication server for wireless clients.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 359: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Wireless LANs 3-23

WPA and WPA2 Modes This topic describes the modes of Wi-Fi Protected Access (WPA).

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—3-7

WPA and WPA2 Modes

Authentication: PSKEncryption: AES-CCMP

Authentication: PSKEncryption: TKIP/MIC

Personal mode(SOHO, home and personal)

Authentication: IEEE 802.1X/EAPEncryption: AES-CCMP

Authentication: IEEE 802.1X/EAPEncryption: TKIP/MIC

Enterprise mode(Business, education, Government)

WPA2WPA

WPA provides authentication support via 802.1X and Pre-Shared Key (PSK) (802.1X is recommended for enterprise deployments). WPA provides encryption support via TKIP. TKIP includes MIC and per-packet keying (PPK) via initialization vector hashing and broadcast key rotation.

In comparison to WPA, WPA2 authentication is not changed but encryption used is AES-Counter with CBC MAC Protocol (AES-CCMP).

Enterprise Mode “Enterprise mode” is a term used for products that are tested to be interoperable in both PSK and 802.1X/Extensible Authentication Protocol (EAP) modes of operation for authentication. When 802.1X is used, an authentication, authorization, and accounting (AAA) server (the RADIUS protocol for authentication and key management and centralized management of user credentials) is required. Enterprise mode is targeted to enterprise environments.

Personal Mode “Personal mode” is a term used for products tested to be interoperable in the PSK-only mode of operation for authentication. It requires manual configuration of a PSK on the access point and clients. The PSK authenticates users via a password, or identifying code, on both the client station and the access point. No authentication server is needed. Personal mode is targeted to SOHO environments.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 360: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

3-24 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

Summary This topic summarizes the key points that were discussed in this lesson.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—3-8

Summary

It is inevitable that hackers will attack unsecured WLANs. The fundamental solution for wireless security is authenticationand encryption to protect wireless data transmission. WLAN standards evolved to provide more security.– WEP – 802.1x EAP– WPA– 802.11i/WPA2

Access points send out beacons announcing SSIDs, data rates, and other information.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—3-9

Summary (Cont.)

With 802.1X, the access point, acting as the authenticator at the enterprise edge, allows the client to associate using open authentication. WPA provides authentication support via IEEE 802.1X and PSK. – Enterprise mode is a term given to products that are tested to

be interoperable in both PSK and IEEE 802.1x/EAP modes of operation for authentication.

– Personal mode is a term given to products tested to be interoperable in the PSK-only mode of operation for authentication.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 361: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

Lesson 3

Implementing a WLAN

Overview There is more to implementing a wireless LAN (WLAN) than selecting the desired standard. Access point placement can have more effect on throughput than standards. It is important that you understand how the efficiency of a WLAN is affect by such issues as topology, distance, and access point location.

Objectives Upon completing this lesson, you will be able to describe the factors affecting the implementation of a WLAN. This ability includes being able to meet these objectives:

Describe the IEEE 802.11 topologies

Describe BSA WLAN service

Describe the effect of distance and speed on WLAN service

Describe the factors that should be considered in implementation of an access point

Describe basic wireless implementation

Describe the form factors to add wireless to laptops

Describe common wireless issues and troubleshooting methods

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 362: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

3-26 Interconnecting Cisco Network Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

802.11 Topology Building Blocks This topic describes 802.11 topologies.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—3-2

802.11 Topology Building BlocksAd hoc mode:

Independent Basic Service Set (IBSS)– Mobile clients connect directly

without an intermediate access point.

Infrastructure mode:Basic Service Set (BSS)– Mobile clients use a single

access point for connecting to each other or to wired network resources.

Extended Service Set (ESS):– Two or more BSSs are

connected by a common distribution system .

802.11 provides several topologies (modes) that can be used a the building blocks of a WLAN:

Ad hoc mode: Independent Basic Service Set (IBSS) is the ad hoc topology mode. Mobile clients connect directly without an intermediate access point. Operating systems such as Windows have made this peer-to-peer network easy to set up. This setup can be used for a small office (or home office) to allow a laptop to be connected to the main PC or for several people to simply share files. The coverage is limited. Everyone must be able to hear everyone else. An access point is not required. A drawback of peer-to-peer networks is that they are difficult to secure.

Infrastructure mode: In infrastructure mode, clients connect through an access point. There are two infrastructure modes.

— Basic Service Set (BSS): The communication devices that create a BSS are mobile clients using a single access point to connect to each other or to wired network resources. The Basic Service Set Identifier (BSSID) is the Layer 2 MAC address of the BSS access point radio card. While the BSS is the fundamental building block for wireless topology and the BSS access point is uniquely identified through a BSSID, the wireless network itself is advertised through a Service Set Identifier (SSID), which announces the availability of the wireless network to mobile clients. The SSID is a wireless network name that is user-configurable and can be made up of as many as 32 case-sensitive characters.

— Extended Service Set (ESS): The wireless topology is extended with two or more Basic Service Sets connected by a distribution system or a wired infrastructure. An ESS generally includes a common SSID to allow roaming from access point to access point without requiring client configuration.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 363: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Wireless LANs 3-27

These are the original standard-defined 802.11 topologies, while other topologies such as repeaters, bridges, and work-group bridges are vendor-specific extensions.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 364: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

3-28 Interconnecting Cisco Network Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

BSA Wireless Topology This topic describes the basic service area (BSA) and extended service area (ESA) topologies and roles in a WLAN.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—3-3

BSA Wireless Topology—Basic Coverage

A basic service area (BSA) is the physical area of RF coverage provided by an access point in a BSS. This area is dependent on the RF energy field created, with variations caused by access point power output, antenna type, and physical surroundings affecting the RF. This area of coverage is referred to as cell. While the BSS is the topology building block and the BSA is the actual coverage pattern, the two terms are used interchangeably in basic wireless discussions.

The access point attaches to the Ethernet backbone and communicates with all the wireless devices in the cell area. The access point is the master for the cell and controls traffic flow to and from the network. The remote devices do not communicate directly with each other; they communicate only with the access point. The access point is user-configurable with its unique RF channel and wireless SSID name.

The access point broadcasts the name of the wireless cell in the SSID through beacons. Beacons are broadcasts that access points send to announce the available services. The SSID is used to logically separate WLANs. It must match exactly between the client and the access point. However, clients can be configured without an SSID (null SSID), then detect all access points, and learn the SSID from the beacons of the access point. A common example of the discovery process is the discovery process used by the integrated Wireless Zero Configuration (WZC) utility when a wireless laptop is used at a new location. The user is shown a display of the newly found wireless service and asked to connect or supply appropriate keying material to join. SSID broadcasts can be disabled on the access point, but this approach does not work if the client needs to see the SSID in the beacon.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 365: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Wireless LANs 3-29

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—3-4

ESA Wireless Topology—Extended Cover

If a single cell does not provide enough coverage, any number of cells can be added to extend the range. The range of the combined cells is known as an extended service area (ESA).

It is recommended that ESA cells have 10 to 15 percent overlap to allow remote users to roam without losing RF connections. For wireless voice networks, an overlap of 15 to 20 percent is recommended. Bordering cells should be set to different nonoverlapping channels for best performance.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 366: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

3-30 Interconnecting Cisco Network Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

Wireless Topology Data Rates WLAN clients are able to shift data rates while moving. This topic describes the effects of distance and speed on WLAN service.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—3-5

Wireless Topology Data Rates—802.11b

WLAN clients have the ability to shift data rates while moving. This technique allows the same client operating at 11 Mb/s to shift to 5.5 Mb/s, then 2 Mb/s, and finally still communicate in the outside ring at 1 Mb/s. This rate-shifting happens without losing the connection and without any interaction from the user. Rate-shifting also happens on a transmission-by-transmission basis; therefore, the access point has the ability to support multiple clients at multiple speeds depending upon the location of each client.

Higher data rates require stronger signals at the receiver. Therefore, lower data rates have a greater range.

Wireless clients always try to communicate with the highest possible data rate.

The client will reduce the data rate only if transmission errors and transmission retries occur.

This approach provides the highest total throughput within the wireless cell. The figure shows IEEE 802.11b; however, the same concept applies to 802.11a or 802.11g data rates.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 367: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Wireless LANs 3-31

Access Point Configuration This topic describes the factors that should be considered when implementing a WLAN.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—3-6

Access Point Configuration

Basic parameters:IP address (static or using DHCP), subnet mask, and default gatewayWireless protocol (802.11g only, 802.11a/b/g, 802.11a)Channel adjustment if needed—channel 1,6, or 11 pending interferencePower adjustment if needed—or could change antenna

Security parameters:Service Set Identifier (SSID)—identifies your networkAuthentication method—usually WPA or WPA2 PSKEncryption method—usually TKIP, or AES if hardware-supported

Wireless access points can be configured through a command line interface (CLI), or more commonly, through a browser GUI. However, the mode of configuration of the basic wireless parameters is the same. Basic wireless access point parameters include SSID, RF channel with optional power, and authentication (security), while basic wireless client parameters include only authentication. Wireless clients need fewer parameters since a wireless network interface card (NIC) will scan all the available RF it is able to scan (meaning that an IEEE 802.11b/g card cannot scan 5 GHz) to locate the RF channel, and will usually initiate the connection with a null SSID to discover the available SSIDs. Therefore, by 802.11 design, if you are using open authentication, the result is plug-and-play. When security is configured with Pre-Shared Keys (PSKs) for older Wired Equivalent Privacy (WEP) or current WPA, remember that the key must be an exact match to allow connectivity.

Depending on the hardware chosen for the access point, the access point might be capable of two frequencies—2.4-GHz industrial, scientific, and medical (ISM) band and 5-GHz Unlicensed National Information Infrastructure (UNII) band—and all three IEEE 802.11a/b/g implementations. The features of the access point usually allow for fine adjustment of parameters such as which frequencies to offer, which radio to enable, and which IEEE standard to use on that RF.

Note The details of these adjustments are not applicable for this course.

When 802.11b wireless clients are mixed with 802.11g wireless clients, throughput is decreased, because the access point must implement a protection Ready to Send/Clear to Send (RTS/CTS) protocol. Hence, if you implement only one IEEE wireless client type, throughput will be greater than if you use a mixed mode.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 368: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

3-32 Interconnecting Cisco Network Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

After configuring the basic required wireless parameters of the access point, additional fundamental wired-side parameters must be configured for the default router and DHCP server. Given a pre-existing LAN, there must be a default router to exit the network and a DHCP server to lease IP addresses to wired PCs. The access point simply uses the existing router and DHCP servers for relaying IP addresses to wireless clients. Because the network has been expanded, you should verify that the existing DHCP IP address scope is large enough to accommodate the new wireless client additions. If this is a new installation with all router and access point functions in the same hardware, then you simply configure all parameters in the same hardware.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 369: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Wireless LANs 3-33

Steps to Implement a Wireless Network This topic describes the basic approach to wireless implementation.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—3-7

Steps to Implement a Wireless Network

Step 1: Verify local wired operation—DHCP and ISP.Step 2: Install the access point.Step 3: Configure the access point—SSID, no security.Step 4: Install one wireless client—no security.Step 5: Verify wireless network operation.Step 6: Configure wireless security—WPA with PSK.Step 7: Verify the wireless network operation.

The basic approach to wireless implementation (as with any basic networking) is to gradually configure and test incrementally.

Before implementing any wireless, verify existing network and Internet access for the wired hosts. Implement wireless with only a single access point and a single client, without wireless security. Verify that the wireless client has received a DHCP IP address and can ping the local wired default router and then browse to the external Internet. Finally, configure wireless security with WPA. Use WEP only if the hardware does not support WPA.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 370: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

3-34 Interconnecting Cisco Network Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

Wireless Clients This topic describes the form factors to add wireless to laptops.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—3-8

Wireless Clients

Wireless Zero Configuration (WZC):Default on Windows XP or later operating systemLimited features for basic PSKVerify that users have the correct encryption type and password

Cisco Compatible Extensions ProgramAccelerated feature deployment of third-party clientsWide deployment of various vendors

Cisco Secure Services ClientEnterprise full-featured wireless client supplicantWired and wireless

Currently, there are many form factors available to add wireless to laptops. The most common are Universal Serial Bus (USB) devices with self-contained fixed antennas and wireless supplicant software, both of which enable wireless hardware usage and provide security options for authentication and encryption. Most new laptops contain some form of wireless. This availability of wireless technology has increased the wireless market and improved ease of use. Newer Microsoft Windows operating systems have a basic wireless supplicant client (WZC) to enable wireless plug-and-play by discovering SSIDs being broadcast and allowing the user to simply enter the matching security PSK for WEP or WPA, for example. The basic features of WZC are satisfactory for simple small office, home office (SOHO) environments.

Large enterprise networks require more advanced wireless client features than those of native operating systems. In 2000, Cisco started a program of value-add feature enhancements through a royalty-free certification program. Over 95 percent of Wi-Fi–enabled laptops shipped today are compliant with Cisco Compatible Extensions. The details and status of versions and features can be found on http://www.cisco.com. The following table is a summary of versions and features.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 371: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Wireless LANs 3-35

Versions and Features

Version Topic Example

v1 Security Wi-Fi compliant; 802.1X, LEAP, Cisco Key Integrity Protocol

v2 Scaling WPA, access point-assisted roaming

v3 Performance and security WPA2, Wi-Fi Multimedia (WMM)

v4 Voice over WLAN Call Admission Control (CAC), voice metrics

v5 Management and intrusion prevention system (IPS)

Management Frame Protection, client reporting

Until Cisco offered a full-featured supplicant for both wired and wireless clients called Cisco Secure Services Client, enterprise networks were managing one set of wired clients and another set of wireless clients separately. The benefit to users is a single client for wired or wireless connectivity and security.

See http://www.cisco.com/go/ciscocompatible/wireless for additional information.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 372: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

3-36 Interconnecting Cisco Network Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

Wireless Troubleshooting This topic describes common wireless issues and troubleshooting methods.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—3-9

Common Wireless Network Issues

Most problems are due to incorrect configuration:Verify that the access point is running the latest revision of firmware.Verify the channel configuration. Try channels 1, 6, or 11.Verify that users have the correct encryption type and password.

Other common problems:RF interferenceNot connected Radio not enabled Poor antenna location

If you follow the recommended steps for implementing a wireless network, the incremental method of configuration is most likely to lead you to the probable cause of an issue. These are the most common causes of configuration problems:

Configuring a defined SSID on the client (as opposed to the method of discovering the SSID) that does not match the access point (including case-sensitivity)

Configuring incompatible security methods

The wireless client and access point must match in authentication method—Extensible Authentication Protocol (EAP) or PSK—and encryption method (TKIP or AES).

Other common problems can result from initial RF installation; for example:

Is radio enabled on both the access point and the client for the correct RF (2.4-GHz ISM or 5-GHz UNII)?

Is an external antenna connected and facing in the correct direction?

Is the antenna location too high or too low relative to the wireless clients (preferably within 20 vertical feet of the client)?

Is a metal object in the room reflecting RF and causing poor performance?

Are you attempting to reach too great a distance?

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 373: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Wireless LANs 3-37

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—3-10

Wireless Troubleshooting

Locate the access point near the center of your home or office. Avoid mounting the access point next to metal objects. Keep the access point out of the line of sight of devices that contain metal. Verify connectivity without the security of PSK.Avoid RF interference from other equipment (gaming, monitors, phones). If the home or office is large, you may need two or more access points.Make sure the access point works over a unique channel not in use by other adjacent access point deployments.

The first step in troubleshooting a suspected wireless issue is to break the environment into wired network versus wireless network. Then further divide the wireless network into configuration versus RF issues. Begin by verifying the proper operation of the existing wired infrastructure and associated services. Verify that existing Ethernet attached hosts can renew their DHCP addresses and reach the Internet.

Then co-locate the access point and wireless client to verify the configuration and eliminate the possibility of RF issues. Always start the wireless client on open authentication and establish connectivity. Then implement the desired wireless security.

If the wireless client is operational at this point, then only RF-related issues remain. First, consider whether metal obstructions exist. If so, move the obstruction or change the location of the access point. If the distance is too great, consider adding another access point using the same SSID but a unique RF channel. Lastly, consider the RF environment. Just as a wired network can become congested with traffic, so can RF for 2.4 GHz (more often than 5 GHz). Check for other sources of wireless devices using 2.4 GHz.

Performance issues that seem to relate to time of day would indicate RF interference from a device. An example would be slow performance at lunchtime in an office located near a microwave oven used by employees. Although most microwaves will jam RF channel 11, some microwaves will jam all RF channels. Another cause of problems could be RF devices that hop frequencies, such as the Frequency Hopping Spread Spectrum (FHSS) used in cordless phones. Since there can be many sources of RF interference, always start by co-locating the access point and wireless client and then move the wireless client until you can reproduce the problem. Most wireless clients have supplicant software that helps you troubleshoot by presenting relative RF signal strength and quality.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 374: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

3-38 Interconnecting Cisco Network Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

Summary This topic summarizes the key points that were discussed in this lesson.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—3-11

Summary

802.11 topologies operate in various modes: – In ad hoc mode, clients connect directly without an

intermediate access point.– In infrastructure mode, clients connect through an access

point. There are two submodes, Basic Service Set (BSS) and Extended Service Set (ESS).

BSS wireless topology consists of the basic service area (BSA) and the extended service area (ESA).

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—3-12

Summary (Cont.)

Wireless access points can be configured through a CLI or, more commonly, a browser GUI.The basic approach to wireless implementation is to gradually configure and test incrementally. Currently there are many form factors available to add wireless to laptops: – Wireless Zero Configuration– Cisco Compatible Extensions – Cisco Secure Services Client

You can troubleshoot wireless by breaking the environment into the wired network and the wireless network. WLAN data rates are affected by standards, access point placement, and distances.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 375: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Wireless LANs 3-39

Module Summary This topic summarizes the key points that were discussed in this module.

© 2007 Cisco Systems, Inc. All rights reserved. ICND1 v1.0—3-1

Module Summary

The various 802.11 standards identify the characteristics of thetransmissions used by WLANs, while WI-Fi Certification ensures compatibility between devices.To address common threats to WLAN services, security has evolved to include 802.1x and WPA.Wireless implementations are affected by distance, speed, and form factors.

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 376: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

3-40 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

Module Self-Check Use the questions here to review what you learned in this module. The correct answers and solutions are found in the Module Self-Check Answer Key.

Q1) What is the most tangible benefit of wireless implementation? (Source: Exploring Wireless Networking) A) cost reduction B) increased mobility C) better productivity D) improved security

Q2) What method does a WLAN use to control transmissions? (Source: Exploring Wireless Networking) A) CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) B) CSMA/CD (Carrier Sense Multiple Access with Collision Detection) C) CSMA/CR (Carrier Sense Multiple Access with Collision Rejection) D) CSMA/CW (Carrier Sense Multiple Access with Collision Weighting)

Q3) Match each factor that influences the transmission of radio waves to its correct description. (Source: Exploring Wireless Networking)

_____ 1. occurs when RF waves bounce off metal or glass surfaces

_____ 2. occurs when RF waves are soaked up by walls

_____ 3. occurs when RF waves strike an uneven surface and are reflected in many directions

A) absorption B) reflection C) scattering

Q4) Which regulatory agency controls the 801.11 standard that governs WLANs? (Source: Exploring Wireless Networking) A) Wi-Fi Alliance B) IEEE C) EMA D) WISC

Q5) Which organization offers certification for interoperability between vendors of 802.11 products? (Source: Exploring Wireless Networking) A) Wi-Fi B) IEEE C) EMA D) WISC

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 377: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Wireless LANs 3-41

Q6) Which three are the unlicensed bands used by WLANs? (Choose three.) (Source: Exploring Wireless Networking) A) 2.4-MHz band B) 900-MHz band C) 2.4-GHz band D) 5-GHz band E) 900-GHz band

Q7) Which two of the 802.11 standards have the highest possible data rates? (Choose two.) (Source: Exploring Wireless Networking) A) 802.11 B) 802.11a C) 802.11b D) 802.11d E) 802.11g

Q8) Which 802.11 standard transmits using the 5-GHz band? (Source: Exploring Wireless Networking) A) 802.11 B) 802.11a C) 802.11b D) 802.11d E) 802.11g

Q9) Which statement is true about the Wi-Fi Alliance? (Source: Exploring Wireless Networking) A) It is a global standards organization that controls the compatibility of Wi-Fi

products. B) It operates only in the United States and ensures the compatibility of Wi-Fi

products. C) It is a global, nonprofit industry trade association devoted to promoting the

growth and acceptance of wireless LANs. D) It is a global, nonprofit industry trade association devoted to promoting the

installation of wireless LANs in retail locations.

Q10) What is a rogue access point? (Source: Understanding WLAN Security) A) an access point that has an open WEP key B) an access point that is broadcasting its SSID C) an unsecured access point that has been placed on a WLAN D) an access point that has had a hardware failure that causes it to endlessly

broadcast its SSID

Q11) Which three are the steps to secure a WLAN? (Choose three.) (Source: Understanding WLAN Security) A) encryption for providing privacy and confidentiality B) authentication to ensure that legitimate clients and users access the network via

trusted access points C) controls to transmit power to limit the access point access range to the property

boundaries of the parent organization D) protection from security risks and availability with intrusion detection and

intrusion protection systems for WLANs

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 378: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

3-42 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

Q12) Which standard provides the strongest level of WLAN security? (Source: Understanding WLAN Security) A) EAP B) WEP C) WPA D) 802.11i/WPA2

Q13) What factor determines which access point a client will associate with? (Source: Understanding WLAN Security) A) the access point with the lowest SSID B) the access point with the highest SSID C) the access point whose SSID is received first D) the access point that is received with the strongest signal

Q14) When using 802.1X, how is the client authenticated? (Source: Understanding WLAN Security) A) The client is authenticated against a local database stored on the access point. B) The access point forwards all network traffic to the server where it is either

authenticated or blocked. C) The access point encapsulates any 802.1X traffic bound for the authentication

server and sends it to the server D) The client encapsulates the 802.1X authentication traffic before sending it to

the access point. This causes the access point to forward it to the server.

Q15) Which statement is true of a comparison between WPA and WPA2? (Source: Understanding WLAN Security) A) WPA uses pre-shared keys, while WPA 2 uses PSK. B) WPA uses EAP authentication, while WPA 2 uses 802.11X. C) WPA uses personal mode, while WPA 2 uses enterprise mode. D) WPA uses TKIP/MIC encryption, while WPA 2 uses AES-CCMP encryption.

Q16) Match the 802.11 topology to its description. (Source: Implementing a WLAN)

_____ 1. Mobile clients connect directly without an intermediate access point.

_____ 2. The communication devices use a single access point for connectivity to each other or to wired network resources.

_____ 3. The wireless topology is two or more service sets connected by a distribution system or, more commonly, a wired infrastructure.

A) ad hoc mode B) Basic Service Set (BSS) C) Extended Services Set (ESS)

Q17) What does the physical area of radio frequency coverage provided by an access point define? (Source: Implementing a WLAN) A) the RF service area B) the basic service area C) the ad hoc service area D) the extended services area

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 379: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

© 2007 Cisco Systems, Inc. Wireless LANs 3-43

Q18) When you are implementing extended service areas, how much overlap is suggested? (Source: Implementing a WLAN) A) 5 to 10 percent B) 10 to 15 percent C) 15 to 20 percent D) 25 to 30 percent

Q19) What allows a client to communicate while moving? (Source: Implementing a WLAN) A) the ability to shift data rates B) the ability to vary transmit levels C) the ability to match the transmit level to the receive level D) the ability to perform error correction as the signal level changes

Q20) Which three are basic wireless access point parameters? (Choose three.) (Source: Implementing a WLAN) A) SSID B) authentication C) data exchange rates D) transmit band selection E) RF channel with optional power

Q21) When implementing a WLAN, when should you use WEP? (Source: Implementing a WLAN) A) only if there is an AAA server available B) when you need the increased security of WEP C) when you are planning to enable 802.11x authentication D) only if the hardware equipment does not support WPA

Q22) Match the wireless client to its description. (Source: Implementing a WLAN)

_____ 1. full feature supplicant for both wired and wireless client

_____ 2. Windows operating systems basic wireless supplicant client

_____ 3. more advanced wireless client features than those of native operating system

A) WZC B) Cisco Compatible Extensions C) Cisco Secure Services Client

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.

Page 380: Interconnecting Cisco Networking Devices Part 1dill.zjtcm.net/new/images/dill/source_wg/ICND/ICND110_SG...ICND1 Interconnecting Cisco Networking Devices Part 1 Volume 1 Version 1.0

3-44 Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.0 © 2007 Cisco Systems, Inc.

Module Self-Check Answer Key Q1) A

Q2) A

Q3) 1 = B, 2 = A, 3 = C

Q4) B

Q5) A

Q6) B, C, D

Q7) B, E

Q8) B

Q9) C

Q10) C

Q11) A, B, D

Q12) D

Q13) D

Q14) C

Q15) D

Q16) 1 = A, 2 = B, 3 = C

Q17) B

Q18) B

Q19) A

Q20) A, B, E

Q21) D

Q22) 1 = C, 2 = A, 3 =B

The PDF files and any printed representation for this material are the property of Cisco Systems, Inc.,for the sole use by Cisco employees for personal study. The files or printed representations may not beused in commercial training, and may not be distributed for purposes other than individual self-study.