4 Token-Ring and FDDI 71Token-Ring 72 Token-Ring Operation 73 Frame Format 73 Token-Ring Fault-Management Mechanisms 75 Priority Scheme 76 Fiber Distributed Data Interface 76 FDDI Specif
Trang 11 General Network Overview 9
2 General Topic Overview 25
V Other Network Protocols 287
15 IPX: Internet Packet Exchange 289
Trang 2CCIE350-001: Routing and Switching Prep Kit Copyright© 2000 by Que ® Corporation.
All rights reserved No part of this book shall be reproduced, stored in a retrieval tem, or transmitted by any means, electronic, mechanical, photocopying, recording,
sys-or otherwise, without written permission from the publisher No patent liability isassumed with respect to the use of the information contained herein Although everyprecaution has been taken in the preparation of this book, the publisher and authorassume no responsibility for errors or omissions Nor is any liability assumed for dam-ages resulting from the use of the information contained herein
International Standard Book Number: 0-7897-2359-xLibrary of Congress Catalog Card Number: 00-100682
Printed in the United States of America
First Printing: June, 2000
02 01 00 4 3 2 1
Trademarks
All terms mentioned in this book that are known to be trademarks or service markshave been appropriately capitalized Que Corporation cannot attest to the accuracy ofthis information Use of a term in this book should not be regarded as affecting thevalidity of any trademark or service mark
CCIE is a trademark of Cisco Systems, Inc
Warning and Disclaimer
Every effort has been made to make this book as complete and as accurate as possible,but no warranty or fitness is implied The information provided is on an “as is” basis.The author(s) and the publisher shall have neither liability nor responsibility to anyperson or entity with respect to any loss or damages arising from the information con-tained in this book or from the use of the CD-ROM or programs accompanying it
Trang 3Composed in AGaramond and Futura by Que Corporation.
Trang 4I would like to thank the engineers and consultants of Lucent NetworkCare (listedbelow) for their collective expertise and effort that was invested in this book Most ofyou wrote your contributions in addition to serving your clients on a full-time basis Ithank you on behalf of myself, BaerWolf, Inc., Macmillan Publishing (Que), and thereaders
I would also like to thank BaerWolf, Inc for entrusting me with this project I haveendeavored to coordinate this effort with your best interest in mind and contribute mytechnical expertise wherever needed
Finally, I must thank my wife Over the last five months you have unconditionallyencouraged me—despite the very long hours, lack of time off, and the mental energythat I have spent on this project instead of on you and our beautiful four-month-oldson I am forever in your debt for your faith, strength, friendship, and love
—Tom Knobel-Piehl, Coordinating Author
About the Authors
BaerWolf, Inc delivers targeted training solutions for businesses that specifically
address their unique training needs The most popular BaerWolf services for the IT andskills development markets include programming, networking, IT management, andthe development of programming and networking course content like you see in thisCisco Certified Internetwork Expert (CCIE) book
BaerWolf works with you to develop a training program uniquely suited to your situationand circumstances With BaerWolf, training is delivered to you when you need it, whereyou need it, and in a format that best matches your desired learning style Our customizedapproach to training solutions includes helping you assess your training goals, determiningthe existing skills of those who need training, and delivering the training to you in themethod you want, including in a classroom, mentoring, in a lab/workshop, online, as self-study materials, or a combination of these methods
BaerWolf ’s long list of satisfied clients include Andersen Consulting, Boeing, BornInformation Services Group, Gateway 2000, Lutheran Brotherhood, Macmillan USA,Mayo Medical Center, MCC Behavioral Care, and US West Communications, Inc Welook forward to adding your company to this list Contact us today at http://www baerwolf.com.
Lucent Technologies NetworkCare is a global provider of network consulting and
soft-ware solutions for the full lifecycle of a network, including planning and design, mentation, and operations Lucent NetworkCare maintains expertise in the most complex
Trang 5imple-network technologies and multivendor environments plus offers industry-leading softwaresolutions for managing and optimizing application-ready networks.
An approach to helping customers stay ahead of network problems is at the heart ofLucent NetworkCare’s Network Engagement Methodology (NEM) This collaborativeknowledge management tool helps assure quality, consistency, and best practices inevery Lucent NetworkCare network consulting engagement
At the root of NEM is Lucent NetworkCare’s Network Lifecycle Methodology (NLM),the basis for providing quality solutions to NetworkCare’s clients NLM provides theconsultants with a framework for applying their technology expertise during the vari-ous stages of the network lifecycle to assure maximum client benefits from our services.This book was written through a collaborative effort with BaerWolf, Inc and morethan a dozen Lucent NetworkCare engineers and consultants who are subject-matterexperts averaging more than 10 years’ networking experience, and most of whom areCisco Certified Internetwork Experts (CCIE), Cisco Certified Network Professionals(CCNP), Cisco Certified Networking Associates (CCNA), and/or Cisco CertifiedDesign Associates (CCDA)
Lucent NetworkCare: Solving your most challenging network problems with the bestminds in the business Visit us at http://www.networkcare.com
Contributing Authors
John Hein Jim Stewart Russ Campbell Sean Boulter Clair LaBrie Mike Balistreri Mike Speed John Markatos Rajvir Wadhwa Dan Overland Jon Grubbs Dennis Olds Sean Snyder Glenn Boyle Dave McMillan
Trang 6Tell Us What You Think!
As the reader of this book, you are our most important critic and commentator We
value your opinion and want to know what we’re doing right, what we could do ter, what areas you’d like to see us publish in, and any other words of wisdom you’rewilling to pass our way
bet-As an associate publisher for Que, I welcome your comments You can fax, email, orwrite me directly to let me know what you did or didn’t like about this book—as well
as what we can do to make our books stronger
Please note that I cannot help you with technical problems related to the topic of this book, and that due to the high volume of mail I receive, I might not be able to reply to every mes- sage.
When you write, please be sure to include this book’s title and author as well as yourname and phone or fax number I will carefully review your comments and share themwith the author and editors who worked on the book
Fax: 317-581-4666 Email: certification@macmillanusa.com Mail: Associate Publisher
Que
201 West 103rd Street Indianapolis, IN 46290 USA
Trang 7Switching Versus Routing 13Tunneling 13
Layer 2 Standards 14
802.3 14 Ethernet 15 802.2 (LLC) 15 802.5 15 802.6 16
Error Checking 19 Termination 19
Interface Speeds 19
LAN Interfaces 19 WAN Interfaces 20
Summary 20
2 General Topic Overview 25
Binary, Decimal, and Hex 26Access Lists 27
Trang 8CCIE 350-001: Routing and Switching Prep Kit
viii
AppleTalk Access Lists 32
Network Filter 32Cable Range Filter 33Range Filter 33Zone Filter 33NBP Filter 33
Distribute Lists 33 Access Class 34
Performance Management 34
Queuing 34
Priority Queuing Commands 35
Resource Reservation Protocol (RSVP) 36 Compression 36
Multiservice Technologies 40
Codecs 41 SS7 41 Real-Time Transport Protocol (RTP) 42
Cisco Device Operation 42
Router Infrastructure Review 42 Router Management 43
Cisco Discovery Protocol (CDP) 46 Simple Network Management Protocol (SNMP) 47 The Cisco Hierarchical Internetworking Model 48
Trang 94 Token-Ring and FDDI 71
Token-Ring 72
Token-Ring Operation 73 Frame Format 73 Token-Ring Fault-Management Mechanisms 75 Priority Scheme 76
Fiber Distributed Data Interface 76
FDDI Specifications 77 Physical Features 77 FDDI Fault-Management Features 78 Bandwidth Features 79
Configurations 93
LEC Configuration 94 LES/BUS Configuration 94 LECS Configuration Example 94 Obtain LES NSAP Address Configuration 95
Simple Server Replication Protocol (SSRP) 95Summary 97
6 LAN Switching 105
Transparent Bridging 106
Configuration of Transparent Bridging 107
Spanning Tree Protocol (STP) 107
Bridge Protocol Data Unit (BPDU) 108 Interface Modes 109
Trang 10CCIE 350-001: Routing and Switching Prep Kit
x
Trunking 111
Trunk Modes 112 Trunk Configuration 112
EtherChannel 113
EtherChannel Modes 113 EtherChannel Configuration 113
VLAN Trunk Protocol (VTP) 114
VTP Messages 115 VTP Configuration 116
Understanding CRB 125 Configuring CRB 125
Integrated Routing and Bridging 126
Understanding IRB 126 Configuring IRB 127
Source-Route Bridging 127
Understanding SRB 128 Understanding RIF Fields 129 Constructing a RIF 131 Configuring Pure SRB 132 Configuring Multiport SRB 133
Remote Source-Route Bridging 134
Understanding and Configuring RSRB 134
Source-Route Transparent Bridging 135
Configuring SRT 136
Source-Route Translational Bridging 136
Understanding Ethernet to Token-Ring MAC Conversion 136 Configuring Basic SR/TLB 137
Data-Link Switching 139
DLSw Terms 139 DLSw Operation 140 Configuring DLSw 141 Command Output Examples 142
Trang 11Transmission Control Protocol (TCP) 160
Features 160 Header Format 161 TCP Connection Establishment 163
User Datagram Protocol (UDP) 163Well-Known TCP/UDP Ports 164Domain Name Service (DNS) 165Internet Control Message Protocol (ICMP) 166Hot Standby Routing Protocol (HSRP) 167Dynamic Host Configuration Protocol (DHCP) 168Network Address Translation (NAT) 169
Summary 171
9 Routing Concept Overview 179
Loop Prevention Techniques 180
Split Horizon 180 Poison Reverse 181 Other Mechanisms 182
Link State Versus Distance Vector 183Classful Versus Classless Routing 184Route Selection 184
Static and Default Routes 185Default Administrative Distances 189Summary 190
10 RIP 195
Routing Metrics 196Route Updates 197RIP Timers 198RIPv1 199RIPv2 200Configuration Examples 202Summary 205
Trang 12CCIE 350-001: Routing and Switching Prep Kit
xii
11 IGRP and EIGRP 209
IGRP 210
Stability Features 211 Route Metrics 212 Route Updates 213 Monitoring IGRP 214 IGRP Configuration Example 216
EIGRP 217
Route Metrics 217 Components 217 Route Summarization 219 Bandwidth Control 220 Adjacency Process 220 Route Convergence 220 EIGRP Configuration Examples 221
Sample Configuration 222Summary 223
12 OSPF 227
OSPF Features 228
Metric 228 Bandwidth Conservation 229 Fast Convergence 229 Hierarchical Design 230 VLSM Support 230 Authentication 230 Memory Requirements 230 Processor Power 230
Hierarchy and Components 233
Area Types 233 Router Types 234 LSA Types 235 Virtual Links 236
Trang 13Filter by Route Example 248Filter by Path Example 249Filter by Community Example 249
Neighbors/Peers 250
Decision Algorithm 250Interior Border Gateway Protocol (IBGP) 252Exterior Border Gateway Protocol (EBGP) 252
CIDR (Classless Inter-Domain Routing) 253
Other BGP Associated Terms and Commands 254
Autonomous System 254 Neighbor Definition 254
To Validate BGP Peer Connections 254 Redistribution 255
BGP Backdoor Command 255 Multi-Exit Discriminator (MED) 255 Methods of Route Manipulation 255 Basics of Route Maps 255
Communities 256 Confederation 256 Route Flap Dampening 256 Route Reflectors 257
Summary 257
14 Managing Routing 261
Route Redistribution 262
Metric Issues 262 Summarization Issues 264 Route Tagging 266
Trang 14CCIE 350-001: Routing and Switching Prep Kit
xiv
Route Management 267
Passive Interfaces 268 Distribute Lists 268 Policy Routing 270 Route Selection 273
Summary 281
15 IPX: Internet Packet Exchange 289
Frame Format 290IPX Addressing 290Encapsulation Types 291
Ethernet 291 Token-Ring 292
Basic IPX Configuration Example 295
Trang 15Contents
Identifying Routes 297 Identifying Servers 299
Filtering IPX Network Traffic 300
Access Lists 300
Standard Access Lists 300Extended Access Lists 300SAP Filters 301
Zones 312Services 312
17 Other LAN Protocols 325
DECnet 326Addressing 327Routing 327Configuration 328NetBIOS 330Summary 331
Trang 16CCIE 350-001: Routing and Switching Prep Kit
Interesting Traffic 350
Dialer Maps 351 ISDN Callback 352 ISDN and Dial Backup 352
More Examples 354
Example 1 354 Example 2 355 Example 3 356 Example 4 357 Example 5 357 Example 6 358 Example 7 358
Summary 359
19 X.25 365
Features 366X.25 and the OSI Model 367Addressing 368
X.25 Routing 369Encapsulation 369
X.25 Over TCP/IP (XOT) 370
Route Tables 371Link Access Procedure Balanced (LAPB) 372Error Control/Recovery 374
Flow Control/Windowing 376
Sliding Window Flow Control 376 Buffering Flow Control 377 Source-Quench Messages 377
Trang 17Contents
Signaling 377Mapping 378Switched Virtual Circuit (SVC)/Permanent Virtual Circuit (PVC) 380
Protocol Translation 383Configuration Example 386Summary 387
20 Frame Relay 393
Frame Relay Overview 394Permanent Virtual Circuits and DLCIs 395Link Management Interface (LMI) 396Frame Relay and Layer 3 Addressing 398
Inverse ARP 399 Frame Relay Maps 400 Subinterfaces 401
Frame Relay Traffic Management 403Cisco’s Implementation of Traffic Shaping 405Summary 408
21 ATM: Asynchronous Transfer Mode 413
PVCs and SVCs 414ATM Interfaces 414
ATM Cell Header Format 416 ATM Protocol Reference Model 416 ATM Addressing 417
ATM Signaling 418
ATM Features and Terminology 419
Service Specific Convergence Protocol (SSCOP) 419 Interim-Interswitch Signaling Protocol (IISP) 419 Quality of Service (QoS) 419
Configuration Examples 420
ATM Permanent Virtual Circuit (PVC) Configuration Examples Using AAL5snap and AAL5mux Encapsulations 420 ATM Switched Virtual Circuit (SVC) Configuration
Example 422
Summary 423
Trang 18CCIE 350-001: Routing and Switching Prep Kit
Trang 19I N T R O D U C T I O N
For years now, data networks have become increasingly important At first,networks were just a large corporate phenomenon Now, almost any businesswith more than a few computers or more than one location has a data net-work And now, with the growth of the Internet, many people’s home com-puters are often connected to a network As data networks grow in size andimportance, there must be a corresponding growth of people required todesign, build, and maintain them
Cisco invented the router and has been selling networking products since
1986 Since then, the company has maintained a definitive lead in the datanetworking marketplace Some people estimate that 85% of routers andswitches are Cisco products Regardless of the exact number (which is hard todefinitively prove), Cisco is and probably will be a major player for a longtime to come
So, two factors should reinforce your decision to obtain Cisco certification:
■ The continual rise in the importance of data networks
■ Cisco’s market leadership in much of this market
So, if you are an entrepreneurial individual who is interested in computers,you’ll see these two factors and notice a growing employment market for peo-ple trained in Cisco networking products Cisco certainly saw this, and that
is why Cisco developed its certification series
Intended Audience and Prerequisites
This book is written for intermediate to advanced network engineers whohave at least some hands-on experience Some topics, even some whole chap-ters, assume you have a certain familiarity with networks We wrote this book
Trang 202
like this for two reasons First, the CCIE is one of the most advanced professional cations in the world It certainly is the most advanced network-related technical certifica-tion It is unrealistic for an average person to be able to read a single book and be able
certifi-to pass the CCIE Written Exam Also, the amount of material that would be required certifi-totake a complete novice to the level of knowledge required to pass the CCIE WrittenExam would not fit within the covers of a single book
We recommend at least two years of solid hands-on data networking professional ence (that is, not just tech college, college, or university classes) before seriously pursuingthe CCIE certification You might be able to pass the written exam, but you’d have totake the lab exam within a year, and classroom experience is just not enough to offer you
experi-a reexperi-asonexperi-able chexperi-ance of success
However, if you have two years of experience, we strongly encourage you to take this bigstep in your career CCIEs are in extremely high demand Not only is a CCIE a greatthing to put on your résumé, but it will help you immensely when it comes time to dis-cuss your salary and benefits package!
Cisco Certifications and the CCIE
The CCIE was Cisco’s original professional certification The company wanted to design
a program that would define people as definitive experts in the field of data networkingwith Cisco equipment The program is designed to prevent people from successfully com-pleting it if all they use for preparation is “book knowledge.” Cisco wanted to ensure that
people with a CCIE have knowledge and excellent hands-on ability (that is, experience).
The company accomplished this by designing a two-step program: a written exam and ahands-on lab exam The written exam could be taken at the same places as other certifica-tion exams (such as Microsoft’s MCSE exams) But the lab exam was originally offeredonly at Cisco’s headquarters in San Jose, California The lab exam was (and is) a two-dayhands-on affair It is proctored and graded by a Cisco staff expert and includes configura-tion and troubleshooting of a variety of general and Cisco-specific technologies
After the CCIE program was established and running, Cisco implemented a number ofother certifications Two of these, CCNA and CCNP, have a twofold purpose First, theyoffer more people the chance to attain some level of certification at different knowledgeand skill levels Second, they form a track to prepare people for the CCIE CCNA andCCNP certifications are not prerequisites for a CCIE, as some people think However,they can be useful in your CCIE preparation, either as training or as validation of yourskills before attempting the challenge of the CCIE More information on these certifica-tions can be found on Cisco’s Web site:
http://cco-sj-2.cisco.com/warp/public/10/wwtraining/certprog/index.html
Trang 21How to Use This Book to Prepare for the Exam
How to Use This Book to Prepare for the Exam
The initial table of contents was derived from Cisco’s CCIE Exam Blueprint, which at thetime of this publication is available at
http://cco-sj-2.cisco.com/warp/public/625/ccie/rsblueprint.html
We used all the same categories as Cisco’s Exam Blueprint, with a few exceptions These
exceptions will be mentioned where appropriate throughout the book Appendix A,
“Objectives Index,” lists the blueprint objectives and where they are discussed in this
book This will help you look up the chapter for any particular objective
The book is designed to be read from beginning to end It is organized to address topics
roughly from simplest to most complex and, after Part I, “Topic Overview,” from the tom of the OSI model to the top Although that approach was our overall goal, we could
bot-not adhere to these philosophies exclusively because so many topics are interrelated and
need to be grouped together In this way, it should be easier to read from start to finish oreasier to skip through some sections if you are a highly experienced or knowledgeable
professional
The Flash Notes pull-out is a boiled-down version of the raw content of the each chapter.Call this your “Parking Lot Review,” if you will You can also use it before reading the
book to see where your strengths and weaknesses are, so you can spend more time where
needed and save time where you can
There is also the Mastery Test CD Unlike most test preparation CDs that are included
with test preparation books, all questions on this CD are different from the questions in
the printed book This will prepare you to answer questions on a computer as if you weretaking the actual exam
There are also lots of great resources in the appendixes:
■ Objectives Index—A mapping of the CCIE Written Blueprint and where the topic
is addressed in the book
■ Glossary—Terms used in the book that are useful to have in one reference location.
■ Certification Process and Testing Tips—How to register for the written test aftercompleting this book Also tips on your final preparation, strategy for taking thewritten test, and how to sign up for the lab exam
■ Alternative Resources—Resources where we got our information and other greatsources for further study, if desired
■ Using the CD-ROM—How to install and use the CD-ROM included with thisbook
Trang 22configu-How Each Chapter Is Organized
Each chapter has roughly the same format and teaching elements The rough format foreach chapter is
■ Overview
■ Details
■ Configuration (where appropriate)
■ SummaryEach chapter includes the following teaching elements to help guide and evaluate yourreading:
■ Prerequisites—What you should read or understand from this book beforeaddressing these topics
■ “While You Read” chapter pretest—Open-ended questions that can serve two poses: to guide your reading through the chapter or to help you decide whetheryou already know the material
pur-■ Key Concepts—Concepts that are important enough for the exam that they areworth emphasizing in a summary sidebar
■ “While You Read” chapter pretest answers—The answers to the “While You Read”questions appear at the end of the chapter
■ Chapter practice test—Questions that are in the same style as you are likely to see
on the actual exam Each question also has an explanation of the answers—whythe correct answers are correct and why the other answers are not
Cisco Command Conventions
To communicate router or switch commands, we use the same formatting conventions asCisco does in its IOS Command Reference (either hard copy or online) The followingare these conventions:
■ All commands will be presented in monospacetype
■ Bold typecommands are entered literally as shown
■ Italicizedcommands describe a value that you need to provide
Trang 23Summary
■ Commands in squared-off brackets ([brackets]) are optional: Use if you desire theresult, or skip
■ Commands separated by a bar (|) are required but exclusive: You must choose one
■ Commands in braces ({braces}) mean you must choose one of the commandswithin the braces: usually used with commands separated by bars (|)
■ Braces within brackets ([ {braces_in_brackets} ]) indicate a required choice in anoptional element: You must choose one if you desire this result (also often usedwith bars)
Trang 25P A R T
Topic Overview
1 General Network Overview
2 General Topic Overview
Trang 27C H A P T E R
General Network Overview
W H I L E Y O U R E A D
1. Which layer of the OSI model is responsible for reliable connections?
2. Which layer of the OSI model did the IEEE redefine?
3. Why are some protocols unable to be routed?
4. What is the difference between acknowledgments and shaking?
hand-5. Which layer of the OSI model defines network addresses?
6. What does the abbreviation CSMA/CD stand for? What is its significance?
7. What happens when an FDDI network fails?
8. Does a Token-Ring network have collisions?
CHAPTER PREREQUISITE
Before reading this chapter, you must have a solid understanding of networking terminology and con- cepts Your understanding should extend from LAN and WAN tech- nology to how these network archi- tectures compare with the Open System Interconnect (OSI) reference model Subsequent chapters build
on the overview presented in this chapter.
S E E
A P P E N D I X F
Lab
Trang 28Chapter 1 • General Network Overview
10
OSI Model
The International Standards Organization (ISO) developed the Open SystemsInterconnection (OSI) Reference Model to define functional communications standards.This reference model is widely used by equipment manufacturers to assure their productswill interoperate with products from other vendors
Seven-Layer Model
The OSI Model is an architectural model that describes functional aspects of data
com-munications The model is composed of seven layers Within each layer are defined tions that are performed within that layer The model does not describe any specificprotocols, only functions Table 1.1 shows the seven layers defined by the OSI model andtheir relationship to one another
func-Key Concept
The OSI model is a functional model It defines functions to be performed and the relationships between functions The OSI model does not define any specific protocols.
Table 1.1 Layers of the OSI Model
Layer Layer Function Sublayer
Layer 7 Application Layer 6 Presentation Layer 5 Session Layer 4 Transport Layer 3 Network Layer 2 Data Link LLC
MAC Layer 1 Physical
The Physical layer defines the parameters necessary to build, maintain, and break the
physical link connections It defines the characteristics of the connectors, data sion rates and distances, and the interface voltages
transmis-The Data Link layer provides reliable transit of data across a physical network link transmis-The
Data Link layer also defines the physical network-addressing scheme, such as the MACaddress on network interface cards in a workstation connected to a LAN The Data Link
Trang 29layer also defines the topology of the network (bus, star, dual ring, and so on) Flow
con-trol at the Data Link layer is defined to ensure receiving stations are not overrun with
data before they can process data already received
The Institute of Electrical and Electronics Engineers (IEEE) has redefined the Data Link
layer into two sublayers The sublayers are the Logical Link Control (LLC) layer and the
Media Access Control (MAC) layer The LLC and MAC sublayers are defined in the IEEE
802.2 standards The LLC manages communications between devices over a single link
of a network The MAC sublayer manages access to the physical medium from multiple
upper-level protocols The MAC layer also defines the MAC address, which uniquely
identifies devices at the Data Link layer
The Network layer defines routing services that allow multiple data links to be combined
into an internetwork The Network layer defines network-addressing schemes that
logi-cally identify network devices The logical network addresses are different from the
physi-cal addresses defined at the MAC layer, and are used by routing protocols running at this
level to transfer packets from one network to another The most common network
addressing protocols are IP, IPX, and AppleTalk Typical routing protocols that run at
this level are RIP, OSPF, IGRP, and NLSP
Key Concept
Routing occurs at the Network layer A protocol suite must have a Network layer
to be routed If a protocol does not have a Network layer, the protocol must be bridged.
The Transport layer implements reliable internetwork data transport services that are
transparent to upper-layer protocols The services include flow control, multiplexing, and
error checking and recovery If virtual circuits are needed for the communication to be
accomplished, they are built and maintained at this layer Flow control is responsible for
making sure that a sending station does not transmit data faster than the receiving station
can process it Multiplexing allows multiple applications to share a common network
interface Error checking is implemented to discover errors on transmission and to
pro-vide a recovery mechanism when errors are found Typical error recovery includes
retrans-mission of the data
Key Concept
Protocols used at the Transport layer will determine whether you are using connection-oriented or connectionless communications Connection-oriented services are provided at this layer.
Trang 30Chapter 1 • General Network Overview
12
The Session layer is responsible for creating, managing, and terminating sessions that are
used by entities at the presentation layer The Session layer is responsible for coordinatingthe service requests and responses generated and received by a station when it is commu-nicating with other entities on the internetwork
The Presentation layer is responsible for encoding and decoding data that is passed from
the Application layer to another station on the internetwork This layer is responsible forencoding data in a format that the receiving station can interpret and for decoding datareceived from other stations Data compression and encryption are accomplished at thislayer Typical coding schemes include ASCII, EBCDIC, MPEG, GIF, and JPEG
The Application layer provides the interface to the user Any user application that requires
network communication accesses the communication resources through this layer Thislayer also is responsible for finding and determining the availability of communicationpartners Typical applications in the TCP/IP protocols are Simple Mail Transfer Protocol(SMTP), Telnet, and File Transfer Protocol (FTP)
A simple mnemonic will help you remember the order of the OSI Reference Model ers Beginning at the lowest layer, the Physical layer, the initial character of each layer’sname is extracted to form the string PDNTSPA This same string results from taking thefirst letter from each word in the following sentence:
lay-Please Do Not Throw Sausage Pizza Away
OSI Protocol Map
Table 1.2 shows the OSI model and some common protocols that exist at each differentlayer
Table 1.2 Mapping of Protocols to OSI Model Function Layers
Application FTP, SMTP, NDS SMB AFP NICE (7) Telnet
Presentation ASCII, MPEG, NCP NetBIOS AFP DAP, MAIL,
Session (5) SAP NetBEUI ADSP, ZIP, SCP
ASP, PAP Transport TCP, UDP SPX NetBEUI RTMP, AURP, NSP
Trang 31FDDI, Frame FDDI, Frame FDDI, Frame Relay, ISDN Relay, ISDN Relay, ISDN Physical (1) 10BASE-T, 10BASE-T, 10BASE-T, 802.3, Ethernet,
100BASE-T, 100BASE-T, 100BASE-T, 802.5, FDDI, Token-Ring, UTP 4/16 UTP 4/16 UTP 4/16 LocalTalk FDDI, Unshielded Unshielded Unshielded x.21bis Twisted Pair, Twisted Pair, Twisted Pair,
Switching Versus Routing
The primary difference between switching and routing is that they operate at different
layers in the OSI model Switching is much simpler than routing and looks at the data
link address (layer 2) to make forwarding decisions There are limited filtering capabilities
with switches Switches keep track of the port from which they have seen a packet arrive
and maintain a data link address to the port table, which is used to forward incoming
packets Routing occurs at the Network layer, or layer 3, in the OSI model The routing
algorithms use the network layer–assigned network addresses to make forwarding
deci-sions Routing provides a much greater filtering capability Filtering can be accomplished
based on network addresses, protocols, and so on using access control lists Some
protocols—for example, NetBIOS—do not have a network layer and cannot be routed;
they must be bridged
Key Concept
Switching services are defined at layer 2 in the OSI model Routing services are defined at layer 3.
Tunneling
Tunneling is the technology used to “package” one network protocol inside another for
delivery The encapsulated protocol and data is carried as data in the encapsulating
proto-col On the far end of the data transmission, the encapsulating protocol is stripped off
Trang 32Chapter 1 • General Network Overview
14
and the encapsulated protocol and its data are processed as normal This technology isused to reduce the number of networks deployed with different protocols Commonexamples include the following:
■ Tunneling serial network traffic in a packet-switched IP network
■ Tunneling a nonroutable protocol inside a routable protocol
■ Tunneling an IPX or some other protocol through an IP network or linkTunneling can eliminate the need for separate serial and IP networks Tunneling can also
be referred to as encapsulation Tunneling is usually deployed on the backbone of a work where transmission facilities are more expensive
net-Key Concept
Tunneling, or encapsulation, is used to carry one network protocol within another It is usually employed to keep from deploying multiple backbone net- works.
Layer 2 Standards
Now that we have reviewed the Physical layer (Layer 1), we can move up the OSI modeland discuss the common Data Link layer, or Layer 2, standards
802.3
The 802.3 standard specifies the Carrier Sense Multiple Access Collision Detect (CSMA/CD)
media-access technology over a variety of different cabling options 802.3 technology isdrawn from an earlier specification for Ethernet (see the section “Ethernet,” later in thechapter) Both 802.3 and Ethernet define physical layer cabling; however, Ethernet isdefined only on coaxial cable, whereas 802.3 is defined for multiple cabling optionsincluding coaxial and twisted pair Both specifications implement CSMA/CD, which isdesigned for networks with sporadic volumes of data transmissions, with only occasionalheavy traffic loads 802.3 is far more common today
The packet format specifications for 802.3 and Ethernet differ primarily at byte offset 19.802.3 has a 2-byte field that contains the length of the data in the frame The Ethernetframe has a 2-byte field with a code defining the upper-layer protocol to receive the data.All stations on the segment see all the packets being transmitted, but they copy the pack-ets onto local buffers only if the Data Link layer address in the packet matches the sta-tion’s data link address Stations transmit data whenever the network is quiet If multiple
Trang 33stations transmit at the same time, a collision occurs When the transmitting stations
detect the presence of a collision, they stop sending, wait a random length of time, and
transmit again
Key Concept
802.3 has a 2-byte field that contains the length of the data in the frame The Ethernet frame has a 2-byte field with a code defining the upper-layer protocol to receive the data.
Ethernet
The original (and literal) Ethernet specification defines a CSMA/CD protocol for coaxial
transmission media (not twisted-pair or fiber-optic cabling as commonly used in today’s
networks) The Ethernet specification predates the 802.3 specification and was developed
by Xerox in the 1970s Today, the term “Ethernet” is used interchangeably to describe
802.3 and Ethernet networks
Both 802.3 and Ethernet are discussed in more detail in Chapter 3, “Ethernet.”
802.2 (LLC)
The Logical Link Control (LLC) sublayer provides a data-repackaging service for different
types of networks This service separates the upper layers from having to know what type
of network is actually being used The upper-layer protocols can then be moved to a
dif-ferent network topology and will not have to make any modifications The LLC is the
upper of the two sublayers defined by the IEEE for the OSI Data Link layer
The 802.2 also implements a protocol header that is used in conjunction with the rest
of the 802 protocols (802.3, 802.5, and so on) The 802.2 header defines Service Access
Point (SAP) fields The SAP identifies the upper-layer protocol that will receive or send
the packet There is a source and destination SAP field in each packet and each field is
one byte long
802.5
The 802.5 specifications define a token-passing network protocol commonly referred to
as Token-Ring In a Token-Ring network, a participating station must wait to acquire a
token frame from the network before it can transmit data The token is a special packet
with a token bit set When a station acquires the token, it can transmit until the token
holding timer expires At that point it must release the token and pass the token to the
next station on the ring
Trang 34Chapter 1 • General Network Overview
sta-The Token-Ring architecture distributes the responsibility for managing and maintainingthe ring among all the participating stations Because the network interfaces are moreintelligent, they tend to be more expensive than Ethernet
Token-Ring is discussed in more detail in Chapter 4, “Token-Ring and FDDI.”
802.6
The 802.6 specification defines a Distributed Queue Dual Bus (DQDB) architecture used
in a Metropolitan Area Network (MAN) In this architecture, two unidirectional data buses
pass cells in opposite directions The cells are fixed in length at 53 bytes: five bytes for aheader and 48 bytes for payload One node is designated as the head of the bus and isresponsible for generating the cells and setting the timing for both buses If the node that
is acting as the head of the bus fails, redundancy features switch the head of the bus’sresponsibilities to another node
The MAN technology is usually implemented as an interconnection between LANs thatare dispersed geographically MANs can be configured to carry traffic at native LAN
speeds, if the underlying transmission facilities are available Switched Multi-Megabit Data Service (SMDS) is based on the 802.6 specifications, but it does not fully implement them SMDS is seen as an intermediate step toward implementation of Asynchronous Transfer Mode (ATM), which is discussed in more detail in Chapter 21, “ATM:
Asynchronous Transfer Mode.”
FDDI
The Fiber Distributed Data Interface (FDDI) specification describes a dual-ring
architec-ture where the tokens on the rings rotate in opposite directions FDDI uses a passing algorithm similar to Token-Ring to allow stations to transmit The architectureprovides fault tolerance in that each station has the capability to connect the two rings in
token-a process ctoken-alled wrtoken-apping, which token-allows the network to continue ptoken-assing dtoken-attoken-a token-around token-a
failed link or station The fault tolerance is limited to a single fault; multiple faults willcause the ring network to break into smaller rings that are not interconnected The speci-fications for FDDI were published by ANSI
FDDI is discussed in more detail in Chapter 4
Trang 35Protocols are developed to define the behavior of communicating partners, such that
desired functions can be performed These functions are performed in protocol suites and
not in individual protocols at specific layers of the OSI Reference Model
Connection-Oriented Versus Connectionless Protocols
Connection-oriented protocols provide error checking, packet sequencing, and connection
path setup and maintenance When a connection is requested, the protocol establishes a
fixed path from the source to the destination During the time when the connection is in
use, the protocol assures that the sequence of packets arrives in the proper order and that
none of the packets is lost If a packet is lost or arrives out of sequence, a retransmission is
initiated to recover the missing packets When the connection is no longer needed, the
connection is torn down between the source and destination, and resources are freed for
other connections Connection-oriented protocols are also referred to as reliable.
A connectionless protocol does not provide any error checking and does not provide any
assurance that data sent from the source reaches the destination As data is transmitted by
the source, the protocol makes a best effort to deliver the packets to the destination, but
it does not guarantee delivery or correct sequence Any error checking required by an
application using a connectionless protocol should be provided by the application
Connectionless protocols are also called unreliable, although the network protocols
usu-ally deliver the packets
An example of a connection-oriented protocol is TCP in the IP protocol suite, and
UDP is an example of a connectionless protocol See Chapter 8, “TCP/IP,” for more
information
Key Concept
Connection-oriented protocols provide error checking and are also called able Connectionless protocols do not provide error checking and are called unreliable Connectionless communications depend on upper-layer protocols to
reli-do any necessary error checking.
Handshaking
A handshake is the exchange of control information during the session setup A
connec-tionless protocol, such as UDP, does not exchange control information (called a
hand-shake) to establish an end-to-end connection before transmitting data In contrast, a
Trang 36Chapter 1 • General Network Overview
18
connection-oriented protocol, such as TCP, exchanges control information with theremote peer network layer to verify that it is ready to receive data before sending it When the handshaking is successful, the peer network layers are said to have established
a connection
ACKs
ACKs, or acknowledgments, are part of a connection-oriented protocol that acknowledges
to the sender that a packet has been received by the destination The sender, on receivingthe acknowledgment, knows that it can now send the next portion of the data stream.Acknowledgments can be affected by the window size
Windowing
Windowing is a technique that improves the throughput of a connection-oriented
proto-col At the time the connection is established, the sender and receiver agree on the ume of data that will be sent before the receiver acknowledges receipt The volume ofdata is usually expressed as the number of packets that will be transmitted The number
vol-of packets is called the window size A large window size permits the sender to send more packets before waiting for an acknowledgment from the receiver However, if there is an
error in one of the packets within the transmitted window, the entire window is mitted, not just the erroneous packet If retransmissions caused by marginal transmissionfacilities are common, a smaller window size should be configured
retrans-Flow Control
Flow control is a process that regulates the volume and timing of data transmissions The
object is to make sure that the sending station does not overrun the receiving station withmore data than it can process or store in its message queue Typically a receiving stationwill queue incoming packets until they can be processed and sent to upper-layer proto-cols If the receiver is busy completing other processing and the incoming queue fills up,the network protocols tell the senders to slow down or stop sending more packets Whenthe queue has been processed below a target level, the protocols tell the senders they canbegin transmitting again
Flow control can also be linked to windowing Some flow-control algorithms use the dow size as a means of flow control When a message queue begins to fill up, the receiv-ing station can reduce the window size in its responses to the sending station Thesending station then reduces the amount of data it sends As the queue is processed, thereceiver adjusts the window size and the sender increases the data volume
Trang 37The Maximum Transmission Unit (MTU) is the maximum size, in bytes, that a station’s
network interface can handle The MTU has a default size for each type of interface, but
the MTU can be adjusted on Cisco router interfaces Packets that exceed the MTU are
fragmented and sent as a series of packets on the network, if the packets are not marked
as “don’t fragment.” If they are marked as “don’t fragment” and the packet is larger than
the MTU, the packets are normally dropped This can be overridden by configuring
MTU discovery on the interface
Error Checking
Error checking on a connection-oriented link will examine packets and look for bytes that
are lost, delayed, duplicated, or misread The packets containing these bytes must then be
retransmitted A timeout mechanism allows devices to detect lost packets and request
retransmission Checksums are used to detect damaged packets A checksum is a value that
is calculated by the transmitting station and included in the packet The receiving station
recomputes the checksum on the data it receives and compares the resulting value to the
value sent by the transmitter If the checksums are the same, the packet is considered
error-free
Termination
When a network connection is no longer needed, the connection is terminated If
addi-tional communications are required between the communicating parties, another
com-munication path must be established
Interface Speeds
Interface speeds vary depending on the type of technology used between communicating
partners Changing the configuration of the host can usually control the speed of an
interface Interface speeds are also called link speeds Interface speeds are defined in
Physical layer protocols
LAN Interfaces
LAN interfaces are relatively fixed, as opposed to WAN interfaces where there are more
options for setting link speeds Token-Ring has been implemented at both 4 and
16MB/second Fast Ethernet interfaces can usually automatically sense a 10MB or
100MB link, and can usually be forced to one of these speeds by configuration Table 1.3
shows LAN interface types and the associated link speeds
Trang 38Chapter 1 • General Network Overview
20
Table 1.3 Common LAN Interface Speeds
Interface Type Link Speed (per Second)
Token-Ring 4MB or 16MB Ethernet 10MB Fast Ethernet 100MB Gigabit Ethernet 1000MB
WAN Interfaces
WAN interfaces have more options for a link’s speed configuration Bonding multiplechannels together, in the case of ISDN or T1 interfaces, can alter the overall link speed.Links speeds can also be affected by the bandwidth available from common carriers; forexample, a fractional T1 will have one of a variety of links speeds depending on how thelink was provisioned from the common carrier Table 1.4 shows the type of WAN inter-faces and the associated maximum link speeds
Table 1.4 Common WAN Interface Speeds
Interface Type Maximum Link Speed (per Second)
ISDN - BRI 128KB ISDN - PRI 1.536MB
High-Speed Serial 52MB ATM - OC3 155.52MB ATM - OC12 622MB
Summary
The OSI model describes the functions that are performed in data communications Themodel architecture is seven layers, with each layer defining specific functions Networkprotocols suites can be mapped to these layers; not all protocols, however, can be cleanlyidentified as belonging to a specific layer because they contain functions defined in multi-ple layers And some protocol suites do not have a function for each layer
Routing and switching are mechanisms for passing data between different segments.Routing uses network addresses and operates at layer 3 in the OSI model Switching uses
Trang 39MAC or DLC addresses and operates at layer 2 in the OSI model Routing provides a
broader range of traffic-filtering capabilities but generates more network traffic and is
more complicated to deploy and maintain
Two communicating peers can establish a connection-oriented or connectionless
commu-nication Connection-oriented communications provide error, sequence, and flow
con-trols Connectionless communications are best efforts by the network and rely on
applications for error checking
Q U E S T I O N S A N D A N S W E R S
1. Which layer of the OSI model is responsible for reliable connections?
A: The Transport layer of the OSI model is responsible for reliable connections
Reliable connections are also called connection-oriented.
2. Which layer of the OSI model did the IEEE redefine?
A: The IEEE redefined the Data Link layer They broke the layer into two ers: the LLC and the MAC sublayers
sublay-3. Why are some protocols unable to be routed?
A: Protocols that do not have a network layer cannot be routed because routingoccurs at the network layer
4. What is the difference between acknowledgments and handshaking?
A: Handshaking is used to negotiate the properties of a connection that is beingestablished Acknowledgments are used to tell the sender that data has beensuccessfully received by the destination during the use of a connection
5. Which layer of the OSI model defines network addresses?
A: Network addresses are defined at layer 3, the network layer Networkaddresses are used for routing An IP address is an example of a network address
6. What does the abbreviation CSMA/CD stand for? What is its significance?
A: CSMA (Carrier Sense Multiple Access Detect) is how Ethernet works Eachstation (carrier) senses traffic When no traffic is sensed, it can access the media
It also detects any collisions and retransmits data if necessary
7. What happens when an FDDI network fails?
A: The ring “wraps” on itself, and the station transmits in the opposite direction
on the second ring
8. Does a Token-Ring network have collisions?
A: No Because there is only one token, only one station can transmit at any time
Trang 40Chapter 1 • General Network Overview
functions that are required for network communications Answer B is correct.
2. Which of the following standards defines the specifications for FDDI?
because 802.6 defines DQDB architecture for MANs Answer E is the correct answer.
3. Which statement best describes tunneling?
A. It is a key component in large database applications and interoperates withdata mining
B. Tunneling is a technique of encapsulating a nonroutable protocol within aroutable protocol so routers instead of bridges can pass the traffic
C. Tunneling is a technique of encapsulating one network protocol withinanother network protocol
Answer A is incorrect because tunneling is unrelated to data mining Answer B is rect because encapsulated protocols are not restricted to being nonroutable, although
incor-nonroutable protocols are frequently encapsulated Answer C is correct because ing allows one protocol to be carried by another protocol of the same OSI layer.
tunnel-4. At what layer in the OSI model would you find protocols such as RIP, OSPF, orNLSP?