Transcript Week_Sixx

Week Six Agenda
•
•
•
•
•
Attendance
Announcements
Review Week Five
Current Week Information
Upcoming Assignments
Review Week Five
Routing in the Enterprise Architecture
Routing in the Enterprise Architecture
Notice that RIP is not a part of an enterprise
design
• It is considered to be too slow to converge
• It is not recommended for large networks
• However, it may be adequate for small
networks and may be present in older
(legacy)networks
EIGRP
The Enhanced Interior Gateway Routing
Protocol (EIGRP) represents an evolution from
its predecessor IGRP.
Key capabilities that distinguish EIGRP from
other routing protocols include fast
convergence, support for variable-length
subnet mask, support for partial updates, and
support for multiple network layer protocols.
EIGRP
A router running EIGRP stores all its
neighbors' routing tables so that it can quickly
adapt to alternate routes. If no appropriate
route exists, EIGRP queries its neighbors to
discover an alternate route. These queries
propagate until an alternate route is found.
OSPF
OSPF protocol was developed due to a need in the
Internet community to introduce a high functionality
non-proprietary Internal Gateway Protocol (IGP) for
the TCP/IP protocol family.
The OSPF protocol is based on link-state technology,
which is a departure from the Bellman-Ford vector
based algorithms used in traditional Internet routing
protocols such as RIP. OSPF has introduced new
concepts such as authentication of routing updates,
Variable Length Subnet Masks (VLSM), route
summarization, and so forth.
BGP
The Border Gateway Protocol (BGP) is the
routing protocol used to exchange routing
information across the Internet. It makes it
possible for ISPs to connect to each other and
for end-users to connect to more than one ISP.
BGP is the only protocol that is designed to
deal with a network of the Internet's size, and
the only protocol that can deal well with
having multiple connections to unrelated
routing domains.
IP sec
Internet Protocol security (IPsec) is a
framework of open standards for protecting
communications over Internet Protocol (IP)
networks through the use of cryptographic
security services. IPsec supports network-level
peer authentication, data origin authentication,
data integrity, data confidentiality (encryption),
and replay protection.
Routers
One of the primary jobs of a router is to
determine the best path to a given destination.
A router learns paths, or routes, from the static
configuration entered by an administrator or
dynamically from other routers, through
routing protocols
Static Routing
Static routes in the routing table
Includes: network address and subnet mask
and IP address of next hop router or exit
interface
Denoted with the code S in the routing table
Routing tables must contain directly connected
networks used to connect remote networks
before static or dynamic routing can be used.
Static Routing
Dynamic Routing
Dynamic routing protocols are used to add
remote networks to a routing table
Are used to discover networks
Are used to update and maintain routing tables
Automatic network discovery
Network discovery is the ability of a routing
protocol to share information about the
networks that it knows about with other routers
that are also using the same routing protocol.
Dynamic Routing
Maintaining routing tables
Dynamic routing protocols are used to share
routing information with other router and to
maintain and update their own routing table.
Dynamic routing protocols not only make a best
path determination to various networks, they
will also determine a new best path if the
initial path becomes unusable (or if the
topology changes)
Routing Table
Routers keep a routing table in RAM
A routing table is a list of the best known
available routes.
Routers use this table to make decisions about
how to forward a packet.
On a Cisco router the show ip route command
is used to view the TCP/IP routing table.
Routing Loops
A network problem in which packets continue
to be routed in an endless circle.
It is caused by a router or line failure, and the
notification of the downed link has not yet
reached all the other routers.
It can also occur over time due to normal
growth or when networks are merged together.
Routing protocols utilize various techniques to
lessen the chance of a routing loop.
Introduction to WANs
A wide area network (WAN) is a computer network
that covers a broad area. Typically, it is any network
whose communications links cross metropolitan,
regional, or national boundaries. WAN transmission
facilities are generally provided by service providers
(SP), such as telephone companies that charge a
usage fee called, a tariff.
WAN Connection Types
Connecting LANs together over a data communications
equipment (DCE) network
Dedicated WANs utilize synchronous serial
connections.
Circuit-switched WANs use telephone company
networks with asynchronous serial, and ISDN.
Packet-switched WANs use a service provider with
synchronous serial.
WAN Connection Types
Leased lines are typically point-to-point connections
or a dedicated connection. The WAN connection path
from the CPE, through the DCE switch, to the CPE of
the remote site, allowing DTE to communicate at any
time with no setup procedures before transmitting
data. It uses synchronous serial lines up to 45 Mbps.
Excellent for constant transmission data flow.
Circuit-switching sets up a line like a phone call. No
data can transfer before the end-to-end connection is
established. Circuit switching uses dial-up modems
and ISDN. It is used for low-bandwidth data
transfers.
WAN Connection Types
Packet switching is a WAN switching method that
allows you to share bandwidth with other companies
to save money. Packet switching is excellent for bur
sty data transfers, packet switching can save you
money. Frame relay and X.25 are packet-switching
technologies . Speeds can range from 56Kbps to
2.048Mbps.
WAN Connection Types
Time Division Multiplexing (TDM) is a
technique for assigning bandwidth on a single
wire, based on pre-assigned time slots, to data
from several channels. Bandwidth is allocated
to each channel regardless of a station’s ability
to send data.
WAN Connection Types
WAN Protocols
Point-to-Point Protocol (PPP) is an industry standard
protocol. PPP can be used to create point-to-point
links between different vendors’ equipment. It allows
authentication and multilink connections and can be
run over asynchronous and synchronous links.
Asynchronous Transfer Mode (ATM) was created for
time sensitive traffic, providing simultaneous
transmission of voice, video, and data. ATM uses
cells rather than packets that are a fixed 53-bytes
long.
WAN Protocols
High-Level Data Link Control (HDLC)
Data Link protocol
Designates a method for data encapsulation on
synchronous serial links
Default encapsulation for Cisco routers
Bit oriented layer protocol created by ISO.
The HDLC header carries no identification of the
type of protocol being carried inside the HDLC
encapsulation. Because of this, each vendor that uses
HDLC has their own way of identifying the Network
layer protocol, which means that each vendor’s
HDLC is proprietary for their equipment.
WAN Protocols
Link Access Procedure, Balanced (LAPB)
Connection-oriented protocol at the Data Link layer
Possesses much overhead because of strict timeout
and windowing techniques
LAPB is used instead of the lower-overhead HDLC if
your link is very error prone
WAN Protocols
Integrated Services Digital Network (ISDN)
is a service offered by telephone companies, It is a
communication protocol that allows telephone
networks to carry data, voice, and other digital traffic.
ISDN network is a digital communication system
that is capable of producing the maximum
transmission speed of 1.4Mbps. 128Kbps speed is
however more common in the digital technology. It's
a international standard for sending data, voice, video
over regular digital telephone lines. ISDN uses UTP
(unshielded twisted pair cable) for transmission.
WAN Protocols
Frame Relay is a packet switching protocol for
connecting devices on a Wide Area Network (WAN).
Frame Relay networks in the U.S. support data
transfer rates at T-1 (1.544Mbps ) and T-3 (45 Mbps)
speeds. In fact, you can think of Frame Relay as a
way of utilizing existing T-1 and T-3 lines owned by a
service provider. Most telephone companies now
provide Frame Relay service for customers who want
connections at 56 Kbps to T-1 speeds. (In Europe,
Frame Relay speeds vary from 64 Kbps to 2 Mbps.
WAN Protocols
Multiprotocol Label Switching (MPLS) replaces the
hop-by-hop, individually routed packet model with a
connection-oriented model that establishes ‘paths’ to
destinations. Instead of routing each packet based
upon its destination address, each packet is labeled
such that it can be switched along a pre-defined
path. Thus, a single destination may have multiple
paths leading to it, with one path used for voice, one
for video, and one for data.
MPLS integrates Layer 2 information about network
links (bandwidth, latency, utilization) into Layer 3
(IP) within a particular autonomous system or ISP in
order to simplify and improve IP packet exchange.
WAN Protocols
Which WAN service is the best one to use?
Answer: None of them. The best WAN service is the
one you can get in your neighborhood or at your
company.
Transmission Modes
Digital transmission, is binary codes of 0 and 1.for
transmission. It is necessary to notify the receiving
end of precise information such as where the data
starts and how long the interval of data is.
“Synchronous”and“asynchronous”are the two modes
for communicating this information, and it is
necessary to confirm which mode a each end
supports. With Synchronous Transmission Mode, 64
kbps is the highest available transmission speed,
while 57.6 kbps is the highest for Asynchronous
Transmission Mode. Drawings
Transmission Modes
Synchronous signals, signals that play the role of
signs are added to the top of the data to be
transmitted. With these signals, computers can
precisely determine the first position of the
characters. This mode can transmit data accurately,
making it appropriate for corporate information
networks.
Synchronous Transmission Mode
0111111001101100110001
Synchronous Signal
01111110
Data First Char
01101100
Data Second Char
11000101
Transmission Modes
Asynchronous signals, instead, use a portion of the
data that has arrived as a clue, the first position of the
character is identified. Two bits are added to each
character, a start bit for the beginning and an end bit
for the end, making the transmission speed slower.
Asynchronous Transmission Mode
001101100101100010110
Start
Stop
Start
Stop
0011011001
0110001011
Data First Char
Data Second Char
Packet-Switched Network Topologies
Star topology is a LAN physical topology with
endpoints on the network converging at a common
central switch (known as a hub) using point-to-point
links. A logical ring topology can be configurated as a
physical star topology using a unidirectional closedloop star rather than point-to-point links. That is,
connections within the hub are arranged in an internal
ring.
Full mesh topology is where every node has either a
physical or a virtual circuit linking it to every other
network node. A full mesh supplies a great deal of
redundancy but is typically reserved for network
backbones because of its expense.
Packet-Switched Network Topologies
Partially meshed topology is where some network
nodes form a full mesh, but others are attached to
only one or two nodes in the network.
Observe the WAN Transport Technology table on
pages 298 and 299 in your text book.
WAN Transport Technologies
DS0 Rate is known as the base channel bandwidth of
64Kbps. A bandwidth of 64Kbps is the bandwidth
required for an uncompressed digitized phone
conversation.
Standard speech less then 4KHz; analog speech is
filtered at 4KHz before being sampled.
Nyquist Theorem sample at a rate at least two
times the input frequency to obtain a signal that
represents the true signal.
Each sample is encoded into 8 bit octets. This
DS0 rate is 8KHz. Per second times 8 bits per
sample, which is 64Kbps.
Technologies
Metro Ethernet technology is based on Ethernet
technology to offer the best cost-effective, high speed
connectivity for MAN and WAN.
DSL technology is a high-bandwidth technology over
the traditional copper lines. It is designed to work
with two modems at either end of the wire. DSL is a
transmission technology that is used by SPs to deliver
a wide range of services to subscribers.
Asymmetric DSL (ADSL) used over short distances
(less then 21meters). Most common type used.
Frequency range 100KHz to 1.1Hz. ADSL allows
PSTN telephone service concurrently on the same
line.
Technologies
Symmetric (SDSL) DSL allows traffic to be
transmitted in both directions at the same speed over
a single twisted pair. The distance served with SDSL
is 10K feet or 3048.8 meters. SDSL is often referred
to as single-pair DSL. SDSL is excellent for running
applications like email and web servers.
Ling Reach Ethernet (LRE) is a WAN access
technology which allows for greater distance than the
traditional Ethernet provides.
Cable technology is another high-speed copper
platform that supports both analog and digital video
services over a coaxial cable.
Technologies
Cabling technology makes use channels for upstream
and downstream data flow. One application channel
in the coaxial cable is used to upstream signals from
the modem to the Cable Modem Termination System
(CMTS). The output from the CMTS is handed to
either the WAN or the PSTN. A different channel is
used for the downstream signals from these Internet
Service Providers to the CMTS to the modem.
The CMTS converts signals from the modem to IP
packets prior to handing them to the IP router for
transmission across the Internet. Downstream signals
are modulated for transmission across the cable to the
modem.
Technologies
Internet download bandwidth over a cable TV line is
shared 27 Mbps.
Internet upstream bandwidth over the same shared
cable is 2.5 Mbps.
Wireless technology electromagnetic waves carry RF
signals. It is the option of some, that these waves
could be harmful to humans.
Synchronous Optical Network/Digital Hierarchy
(SONET/SDH) is the ANSI standard for synchronous
transmission on fiber optic media. It specifies a base
signal rate (OC-1) of 51.84 Mbps and a set of
multiples of that rate, known as Optical Carrier
levels, up to 9.5 Gbps for OC-192.
Technologies
SONET/SDH is a circuit based technology that
provided uses high speed circuits using TDM
framing.
Dark fiber is a fiber optic cable(s) leased from an SP.
Fiber is typically connected to a company’s own
infrastructure. Dark fiber got its name after the dotcom burst. Many of the companies that had the rights
to these fiber networks either went bankrupt, or, had
to abandon their goals of utilizing this fiber. This
resulted in hundreds of thousands of miles of “unlit”
(dark) fiber. Dark fiber is optical fiber that is lying in
the ground unutilized
WAN Bandwidth Optimization
Compression is used to reduce the data size to
conserve transmission time.
Upcoming Assignments
Assignment 4-1-2, Basic Routing and LAN Switching
Configuration is due November 10, 2010. The
network lab has been request for November 3, 2010
Assignment 4-1-3, Basic Network Troubleshooting is
due November 24, 2010