Cisco Certified
Internetwork Expert
Internetworking Fundamentals
Cisco’s Fundamentals Online:
Click here
Cisco’s Internetwork Design
Guide:
Click here
OSI
|
|
|
Service advertisement, service
availability. Manages communications between applications. (FPDAM)
File, Print, Database, Application, and Messaging services. Allows
applications to use the network. Handles network access, flow
control and error recovery.
|
PRESENTATION
|
Translation,
compression, encryption, data conversion. Translates data into a
form usable by the application layer. The redirector operates here.
Responsible for protocol conversion, translating and encrypting
data, and managing data compression. |
RPC (Remote
Procedure calls) functions here. |
Connection
establishment, data transfer, connection release (Half duplex, full
duplex, simplex). Allows applications on connecting systems to
establish a session. Provides synchronization between communicating
computers. |
|
Service addressing,
segmentation and transport control, flow control, end-to-end data
integrity. Responsible for packet handling. Ensures error-free
delivery. Repackages messages, divides messages into smaller packets
and controls error handling. |
|
Logical addressing,
switching, routing, network control. Translates system names into
addresses. Determines routes for sending data and manages network
traffic problems, packet switching, routing, data congestion and
reassembling data. |
|
Sends data from
network layer to physical layer. Manages physical layer
communications between connecting systems.
LLC Layer (Logical
Link Control): flow control and timing (802.2). Manages link control
and defines SAPs (Service Access Points).
MAC Layer (Media
Access Control): framing and physical addressing (802.3, 802.4,
802.5, 802.12). Communicates with adapter card. |
Is concerned with
definition of low level functions (voltage, media
types) |
Transmits data over
a physical medium. Defines cables, cards and physical aspects as
well as electrical properties, transmission media, transmission
devices, physical topology, data signaling, data synchronization and
data bandwidth. Manages data placement on and data removal from the
network media. |
TCP/IP Addressing: IP basics Documentation by Cisco
Private address blocks
Ports
Ports by number
Routing and Routed
Protocol Basics:
Routing basics by Cisco
-
Routed
Protocols are IP, IPX
and AppleTalk (AT).
-
Routing
protocols are OSPF, RIP, RIP II, EIGRP, NLSP, RTMP, etc.
-
These are Internal Routing protocols
where BGP would be external.
-
Distance vector protocols are RIP,
RIP II, IGRP, and IPX RIP.
-
Link State Protocols are
OSPF, NLSP,
etc
-
EIGRP is considered a Hybrid Routing
protocol
-
Important routing Protocols based on TCPIP, NOVELL or AppleTalk:
-
IP- RIP
-
IP – OSPF
-
IP – EIGRP
-
IPX – IPX RIP
-
IPX – NLSP
-
IPX – EIGRP
-
AT – RTMP
-
AT – EIGRP
-
Notice EIGRP (the Hybrid) works with
them all
-
Scalability restraints
-
IP – 500 Workstations
-
IPX – 300 Workstation
-
AT – 200 Workstations
-
NetBios – 200 Workstations
-
Mixed – 200
Workstations
-
MTU – You should be careful and
avoid changing the size of the Maximum Translation Unit, but if you do,
you can improve network performance by manipulating that size to be the
largest possible.
-
Ipv4 Header size: 20 Bytes
W/Options
-
Ipv6 Header size: 40 Bytes
Fixed
-
Standard administrative distances
for IP routes (the lower the number the more preferred the route
will be)
Directly connected
interface |
|
Static route using
connected interface |
|
Static route using
IP address |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Routing (Dynamic –
Static)
Dynamic
-
With Dynamic Routing, routers pass
information between each other so that routing tables are regularly
maintained.
-
The routers then determine the
correct paths packets should take to reach their destinations.
-
Information is passed only between
routers.
-
A routing domain is called an
Autonomous System, as it is a portion of the Internetwork under common
admin authority.
-
Consists of routers that share
information over the same protocol. Can be split into routing areas.
Distance Vector
-
Used in smaller networks that are
have fewer than 100 routers.
-
Easy to configure and use.
-
As routers increase in number, you
need to consider CPU utilization, convergence time, and bandwidth
utilization.
-
Convergence is due to routing
updates at set intervals; e.g., 90 seconds.
-
When a router recognizes a change it
updates the routing table and sends the whole table to all of its
neighbors.
-
Routing loops or counting to
infinity occurs because of the delay in sending updates. This problem
can be fixed with:
-
Split Horizon
- Info cannot
be sent back on the interface it was received from
-
Route Poisoning
- When the
network goes down, route gets set to 16 or unreachable until it’s back
up
-
Hold–Downs - Prevents
routes from changing too rapidly in order to determine if a link has
really failed, or is back up
Link-state
-
Maintains Topology Database.
-
Routers have formal neighbor
relationship.
-
Exchanges LSA (Link State
Advertisement) or hello packets with directly connected interfaces.
-
These are exchanged at short
intervals (typically 10 sec).
-
Only new info is exchanged.
-
Scales well: only downside is that
link–state protocols are more complex.
Appletalk: Cisco’s Documentation on AT
|
|
|
|
|
|
RTMP, AURP, NBP, ATP, AEP |
|
|
|
|
|
|
-
RTMP – Routing Table Maintenance
Protocol – a Distance vector protocol that has a default update timer of
10 seconds. Updates only when changes occur.
-
AURP – AT Update-based Routing
Protocol that allows the creation of a tunnel to interconnect two AT
based networks through TCPIP to form an AT WAN. AURP uses UDP. It does
not send periodic updates through the link.
-
With AT, your client devices will
automatically select a network address and will then broadcast a probe
to ensure that it is unique.
Also, with AT – your workstations have the ability to remember the
router address that sent the last RTMP packet
EIGRP: Cisco’s Documentation on EIGRP
-
Enhanced Interior Gateway Routing
Protocol
-
A hybrid Routing protocol
-
Proprietary to Cisco
-
Uses metrics:
BAN-DEL-REL-LO-MAX (How I remember it)
-
BANDWIDTH
-
DELAY
-
RELIABILITY
-
LOAD
-
MTU (Maximum Transmission
Unit) Notes on MTU
Note: Documentation for IGRP
WAN and LAN protocols
Ethernet:
Cisco documentation on Ethernet, Fast Ethernet and
Gigabit.
You must know this-
Make sure you visit the hyperlinks of each one
and do extra research.
ATM:
Cisco’s Documentation on ATM
-
Asynchronous Transfer Mode
-
FIXED length, 53 byte cells (48
payload +5 header).
-
ATM Layers are at layer 2 while the
Adaptation Layer is Layer 3.
-
AAL’s have the responsibility of
isolating the upper layer protocols from the ATM process details.
-
Frame types (or better to be called
Adaptation layers)
-
AAL1 – will take a continues bit
stream and will place it within the ATM cells, between source and
destination – ATM will Require timing synchronization.
-
AAL3/4 – supports connectionless
and connection-oriented data. Adds a header and a trailer whereas AAL5
does not. (Messages can be interleaved)
-
AAL5 – Also supports
connectionless and connection-oriented data but also supports LANE.
(LAN Emulation) AAL5 can also be referred to as SEAL (Simple and
Efficient adaptation layer)
-
A knowledge of ATM and its framing
should be reviewed.
PPP:
Cisco’s Documentation on PPP
-
Point to point protocol.
-
Major benefit is the use of more
protocols then just TCPIP.
-
There are other protocols used
-
LCP
– Will establish, then
configure (and test) the connection
-
NCP
– (A family of NCP’s)
will establish and configure the upper layer protocols.
-
PPP uses HDLC as a basis to have
encapsulation of Datagrams over Point-to-point links.
-
HCLC –High level data link control.
-
Make sure you are comfortable with
the whole PPP process.
X.25:
Cisco’s Documentation on X.25
-
A WAN protocol that operates at
Layers 1-3 of the OSI
-
Offers Error checking but becomes
slower due to that extra checking
-
X.25 Protocol suite
-
Layer 3 – PLP (Packet Layer
Protocol) will manage the packet exchange between the DTE devices
across a virtual link
-
Layer 2 – LAPB (Link Access Procedure B) Data Link Layer Protocol
that will deal with the packet framing between the DTE and DCE
devices. Operates at Layer 2. Integrated into X25. Router can be DTE
or DCE. HDLC confined to ABM transmission. Job is to make sure that
frames are error free. There are three different frame types:
Information frames - flow control, error detection; S Frames -
requesting and suspending communications; and U Frames - link setup,
disconnecting, error reporting. Has high overhead, but good error
checking
-
Layer 1 – (X.21bis) X-21bis
will handle the Layer 1 aspects of activation / deactivation at speeds
of up to 19.2 Kbps.
-
X.25 uses other physical layer
serial interfaces: EIA-TIA 232, EIA-TIA 449, EIA-530 and
G.703.
SDLC
(Synchronous
Data Link Control) Cisco’s Documentation on SDLC
-
Main SNA link layer protocol. PTP,
half, full duplex. Two node types: Primary Stations control other
stations, setup and manage links. Secondary stations can only transmit
to the primary and only after permission.
HDLC
(High-Level Data Link Control) Cisco’s Documentation on HDLC
ISDN
Cisco’s Documentation on ISDN
Cisco’s Documentation on Designing
ISDN networks: Click here
Supports data, text, voice, music.
BRI 2 B and 1 D Channel. PRI 23B + 1D or in Europe 30 B + 1D.
ISDN Terminals – TE1 – Terminals
that understand ISDN Standards; TE2 precedes ISDN standard have to use a
terminal adapter. ISDN has four reference points to define logical
interfaces R = TE2 to TA, S = Terminal and NT2; T= NT1 to NT2; U = NT1 and
line termination equipment
ISDN Protocols
Frame Relay
Cisco’s Documentation on Frame Relay
-
Establishes a Frame relay Virtual
Circuit that is a connection between two DTE devices.
-
Two circuit types: Permanent (PVC)
and switched (SVC) identified by DLCI.
-
Multi–protocol support: IP, DECnet,
Appletalk, IPX, XNS, ISO.
-
More efficient and faster than X.25
because of less error checking.
-
Default encapsulation on CISCO is
CISCO or can be IETF. Use IETF if connecting to non–Cisco devices with
frame relay.
-
DLCI – Data Link Connection
Identifier – IP addresses need to be mapped to DLCI's to communicate
over a virtual circuit. Can be done dynamically with IARP or manually
though the map command.
-
LMI - Local Management Interface –
gives DLCI global rather than local significance. Makes entire frame
relay network appear as typical LAN. Manages status-providing info on
keep–alives, multicasting, addressing and status of virtual circuit.
With version 11.2 of IOS, auto–sensed.
-
Three LMI types Cisco (default) ANSI
and q933a.
-
Subinterfaces allow you to route IP
on one virtual circuit and IPX on the other.
-
Some routers have limits - 2500 can
handle max of 255. Two types of sub interface Point–to–point and
multipoint.
Frame Relay
Congestion Control
-
DE
– Discard Eligibility used
to identify traffic importance
-
FECN
(Forward Explicit
Congestion Notification) – To tell others the path is congested
-
BECN
(Backward Explicit
Congestion Notification) – Goes back to sending router to tell it to
slow down
-
CIR
(Committed Information
Rate) – Minimum bandwidth guaranteed. Choose realistic level; can choose
zero if retransmission is acceptable. Can be by BC or committed burst
size that allows customers to exceed CIR for limited time
IBM networks – Source Route Bridging
For in depth explanations on
Cisco’s site click here: SRB | SNA | IBM
-
Bridging basics: Creates a single
data–link, flat network
-
Transparent Bridging – Connects
two or more Ethernet segments. Learns MAC address of all devices and
then starts filtering.
-
Integrated Routing/Bridging –
Allows you to route and bridge the same protocol by using a virtual
bridge–group interface
-
Source–Route Bridging – Knows the
entire route to destination before it sends data. Not designed for
large networks.
-
Source–Route Transparent Bridging
– Use this when you have to go across bridging domains. Affects
spanning tree, as packets cannot cross over domains and therefore you
cannot have multiple paths between these domains.
-
Source Route Bridge (also known as
–SRB)
-
Route descriptors – They are bridge/
ring #’s fields in a RIF. They are used to set the path that a frame
should take on a SRB network.
-
SRB frames contain a RIF that has
routing descriptors to the destination
-
SRB networks use DLSw+ to establish
a TCP link so that it can reduce NetBios / broadcast traffic queries
occurring between peers.
-
In SRB networking, the SOURCE
determines the route to arrive at the destination node BEFORE
sending information frames to it.
-
In SRB networking, the source node
will acquire the routes to destinations using something called
EXLORER FRAMES.
-
SRB can use STP, but does not rely
on it because it is usually loop free. It would use STP when sending
explorer frames to reduce the traffic on the line during its route
discovery process.
-
SRB is locked down to a hop count of
7 bridges.
Cisco’s
Documentation on Designing SRB networks: Click here
Cisco Documentation on Designing DLSw+ network: Click here
Router Basics
Router Switching
-
Process Switching
-
Packet gets copied to process
buffer, address is retrieved and the packet is encapsulated and
forwarded on the appropriate outbound interface. Cache is updated and
subsequent packets to the same address are handled on cached info.
Most processor intensive.
-
Silicon Switching
-
Only 7000 Series + SSP6. The SSP
is a dedicated switch processor that takes over from the router
processor. Fast solution.
-
Optimum Switching
-
Faster than both Fast and Netflow
Switching. Replaces fast switching on high-end routers.
-
Fast Switching
-
Is used when no entries exist in
more efficient caches; on by default in low-end routers; sometimes
necessary to disable due to memory limits or to aid troubleshooting.
-
Autonomous Switching
-
Compares packets against
autonomous switching cache. When a packet arrives the interface checks
the switching cache closest to it. Only found on 7000 and AGS+ series
routers.
-
Distributed Switching
-
Happens on VIP (Versatile
Interface Processor), very efficient. Gets more efficient as more VIP
cards added. No need to use router processor.
-
Netflow Switching
-
Admin tool increases overhead;
gathers stat data, port, protocol, and user info that can be sent to a
management station.
Commands
-
Show interface
-
Will show router Layer 2 errors (CRC, collisions, etc.)
-
Ping | traceroute
-
Enables you to ping and perform Route Tracing functions
-
Show access-lists
-
Will display your access lists and you can also specify by number
-
Debug
- Shows real
time - should be used with caution - very CPU intensive
-
Show {protocol}
route - Will show routing table
-
Show processes
-
Will show CPU usage and CPU time
-
Show buffers - Will
show usage and misses
Route Summarization
-
Contiguous networks are grouped
together and advertised as a single entity called a supernet.
-
Move network prefix to the left
(i.e., borrow bits from network portion of address) to describe a single
route to contiguous block of IP addresses (Classless Inter–Domain
Routing or CIDR).
-
This can only be done using
contiguous IP addresses.
Note: Classful routing uses Class A, B, C addresses.
Design Fundamentals
Hierarchical Topologies (Cisco defines a three–layered approach)
|
-
The backbone of the network.
-
If there is a problem here
everyone is likely to be affected.
-
Key issues: Bandwidth, Fault
Tolerance, no workgroup access at this
level. |
DISTRIBUTION
|
-
This is where the management
really takes place.
-
At this level you would
implement filtering, security policies, routing and other support
functions |
ACCESS
|
-
This is where users connect to
the Internetworks.
-
Some functions of this layer
are creation of collision domains, access control, and policies.
-
Examples of technology at this
layer are DDR and Ethernet
switching. |
Cisco's Small/medium Sized Business Solution Framework
Broken into three Categories
|
|
Protocol
Problems
|
|
Transport
Problems
-USE ATM OR fast
/ Gigabit Ethernet |
|
Analyzing Customer Requirements
falls into two areas:
|
-
What the company does, who the
contacts are, who has authorization to sign off on approval, what
the company growth forecast is, whether or not a solution has been
attempted before. |
Technical
Data
|
-
Analysis of information flow,
shared data, locations, network traffic between segments
-
Broken even further into:
Performance Requirements, Application Requirements, Security
Requirements, and Network Management Requirements. (FCAPS) |
Network Management:
(FCAPS)
Network Management straight from Cisco:
Click here
Constraints to Design
Business / Political
Constraints |
-
How many people will be hired
next month (Current and future staffing requirements)
-
Business goals / motivations
-
The corporate, geographic
structure
-
Politics and
policies |
Technical
assessment - constraints
|
-
Applications assessment –
information flows, shared data – how are these constraints to
design?
-
Performance assessment
questions and baselining
-
Network management and
security assessments- what are the
risks? |
Twelve steps to document the
customers existing network
1. Characterize
the Customer’s applications |
-
Applications, type, how many
users use the applications, what servers hold the applications and
what segment they reside on.
-
Map and monitor application
flows – very helpful. |
2.
Characterize the network protocols
|
|
3.
Document the current network
|
|
4.
Identify the potential bottlenecks
|
-
20/80 rule
(No more
than 20% of network traffic should cross over into another segment
– or that 80% of your traffic should stay local to that segment)
-
Use network management tools
to analyze with: Netsys, Netflow, CiscoWorks, and a Protocol analyzer/Sniffer.
-
Cisco’s Network Management
Home page- click here. |
5.
Identify the business constraints / inputs into the network
design
|
|
6.
Characterize the existing network availability
|
-
Which segments are critical?
-
Concern yourself with the MTBF
(Mean time between failures)
-
What is the cost to the
company for major outages. |
7.
Characterize the network performance
|
|
8.
Characterize the existing network reliability
|
-
Documenting the traffic can
very well be your most time consuming effort.
-
You can use a protocol
analyzer for the task.
-
You basically want to start
documenting the total MB’s, # of frames, CRC errors, MAC layer
errors, and total broadcasts /
multicasts. |
9.
Characterize the network utilization
|
|
10.
Characterize the status of your major routers
|
-
This is where your command
(listed above) comes into play.
-
Show interfaces,
process, etc. |
11.
Characterize the existing network management tools
|
|
12.
Summarize the health of the existing network
|
|
Fields for documenting the
customer’s existing applications: (Step 1)
|
|
|
|
|
|
Identify each
application Running on the network |
Characterize the
type of application
|
# Of users for
each application |
How many servers
provide each of the applications |
The segments the
application runs on |
Comments that
could be useful at a later
time |
Fields for
documenting the customers existing Protocols: (Step 2)
|
|
|
|
|
Identify each
Protocol Running on the network |
Characterize the
type of Protocol – routing, routed, LAN |
# Of users for
each Protocol |
How many use each
of the Protocols |
Comments that
could be useful at a later
time |
Three Part Firewall
|
DMZ
(De-Militarized Zone): (Isolation LAN) |
|
On the outside of
the isolation LAN is a router that will implement access lists to
filter traffic usually from the Internet. |
-
In the isolation LAN, hosts
are installed to provide WWW, FTP, mail relay and DNS services to
name a few.
-
These isolated hosts are
named bastion hosts. |
An
internal filtering router permits access to the internal LAN from
the isolation LAN or to filter it.
|
Note: A PIX Firewall is Cisco’s Firewall based product, but
remember that the IOS has a Firewall / NAT based feature set.
Design Document
Components
Responding to an RFP (Request for
Proposal)
|
-
Directed to decision makers.
-
Provides an explanation of the
purpose of the project, a list of strategic recommendations and a
description of how the solution meets the customers
requirements. |
Design
Requirements
|
-
Shows current topology,
current applications and current network health.
-
Lists performance and
scalability requirements, business requirements and constraints
and expected performance. |
Design
Solution
|
|
Summary
|
|
Appendixes
|
|
Cost
(Optional)
|
|
Network Management
Cisco documentation on SNMP and RMON
|
Is a router or
switch with agent software. |
|
Runs network
management applications. Polls devices for SNMP information and
configuration. |
|
|
More Products
|
|
CiscoWorks Blue
|
|
CiscoWorks2000
|
-
A family of products based on
Internet standards for managing Cisco enterprise networks and
devices.
-
It includes Resource Manager
Essentials and CWSI Campus.
-
It runs on UNIX or Windows
NT. |
CiscoView
|
-
GUI-based device management
software application that provides dynamic status, statistics and
comprehensive configuration information for Cisco systems
internetworking products.
-
Displays a graphical real-time
physical view of Cisco devices. |
Cisco ConfigMaker
|
-
An easy-to-use Microsoft
Windows application used to configure a small network of Cisco
routers, switches, hubs and other network devices from a single
PC, without requiring knowledge of Cisco IOS. |
Netsys Baseliner
|
-
Tool that displays, debugs and
validates your network configuration.
-
Tests configurations and
changes offline before committing them to the live
network. |
RMON
|
|
Traffic Director
|
|
For a detailed list of most of Cisco’s
Network Management tools: Click here
Routers and Switches
Test your
design: (Determining the Appropriate Testing Plan)
-
Pilot – Very small implementation,
used to get your point across
-
Prototype – A larger scale
and costly test of your design.
Notes for study and test
-
Make sure you have studied
thoroughly; you will be asked in depth questions from every corner of
your study guides.
-
Make sure you have enough practice
with case studies. This is not a test for you to just memorize all these
facts. You need to know how to implement them. Therefore, practice the
case studies. Click
here
-
Make sure you are comfortable with
the Cisco Product line. You will be expected (like any good designer)
too offer your advice on what products to implement for the best price.
-
Use the Cisco Site – you can look at
most of your information right from the Documentation provided to you.
Click here
|