Professional Documents
Culture Documents
introduction
OSI Layers
The OSI reference model consists of seven layers, each of which can (and
typically does) have several sub layers.
The lower three layers (network, data link, and physical—Layers 3, 2, and 1)
define functions focused on End to-end delivery of the data.
OSI – Layer Structure
OSI – Reference Model Details - 1
Application ( Layer – 7) An application that communicates with Telnet, HTTP, FTP , WWW
other computers is implementing OSI Browser , SMTP and SNMP
application layer concepts. The
application layer refers to
communications services to
applications.
Presentation (Layer – 6) This layer’s main purpose is defining JPEG, ASCII, EBCDIC
data formats, such as ASCII text, ,TIFF , GIF , MPEG
EBCDIC text, binary, BCD, and JPEG.
Encryption also is defined by OSI as a
presentation layer service
Session ( Layer – 5) The session layer defines how to start, RPC, SQL, NetBios names,
control, and end conversations (called AppleTalk ASP,
sessions).
OSI – Reference Model Details - 2
• Example : 140.179.220.200
• Every IP address consists of two parts, one identifying the network and one
identifying the node.
• The Class of the address and the subnet mask determine which part belongs to the
network address and which part belongs to the node address.
IP Addressing - Address Classes
• There are 5 different address classes. You can determine which class any IP address is in by
examining the first 4 bits of the IP address.
• So 255.255.255.255 , in this case all the 8 bits in all the class are full
• Addresses beginning with 01111111, or 127 decimal, are reserved for loopback and for
internal testing on a local machine. For Example [Ping 127.0.0.0 – t ]
• [You can test this: you should always be able to ping 127.0.0.1, which points to yourself]
• Class D addresses are reserved for multicasting. Class E addresses are reserved for future use.
They should not be used for host addresses [ for computers]
• Now we can see how the Class determines, by default, which part of the IP address belongs to
the network (N) and which part belongs to the node (n).
• Class A -- NNNNNNNN.nnnnnnnn.nnnnnnn.nnnnnnn
• Class B -- NNNNNNNN.NNNNNNNN.nnnnnnnn.nnnnnnnn
• Class C -- NNNNNNNN.NNNNNNNN.NNNNNNNN.nnnnnnnn
• Class A IP = 10.0.0.0
• Class B IP = 192.196.0.0
• Class C IP = 202.240.192.0
Private Subnets
• It is always safe to use these because routers on the Internet will never forward
packets coming from these addresses
Subnetting
• In an Ethernet network, all nodes on a segment see all the packets transmitted by all the
other nodes on that segment.
• Performance can be adversely affected under heavy traffic loads, due to collisions and
the resulting retransmissions.
• A router is used to connect IP networks to minimize the amount of traffic each segment
must receive.
Subnet Mask
• Applying a subnet mask to an IP address allows you to identify the network and node
parts of the address.
• The network bits are represented by the 1s in the mask, and the node bits are represented
by the 0s
Modules Details
IPSec +SNA
IPSec
SNA
RM2-1ETE
MP801E-DC RM2-1M128
RM2-1M336
RM2-1CEl
RM2-1E1
MP801E rear panel RM2-1U
RM2-1ST
RM2-1/2VOP
RM2-1/2VOS
RM2-1SAE
RM2-1ETE
Port density 1
standard 802.3
Port density 1
standard G.703
protocol ·PPP
·X.25
·HDLC
·FR
C3434- CABE1/CE1-BNCM-S-
BNC Male to BNC Male Cable default 2
1040 BNCM
Port Density 1
Standard PPP
Protocol ·IP
Port Density 1
Standard G.703
·X.25
Link Protocol
·FR
·PPP
Link Protocols
·HDLC
InfoExpress IOS of Maipu’s MP Router series provides a special subsystem dealing with commands for management and
execution of system commands, which is called shell.
The Shell subsystem presently provides the following modes for running
the configuring commands
Common user mode………… (User EXEC)
Privileged user mode……… (Privileged EXEC)
Global configuration mode………….. (Global configuration)
Interface configuration mode ………. (Interface configuration)
Route configuration mode ……………. (route configuration)
File system configuration mode………. (file system configuration)
Access list configuration mode……….. (access list configuration)
Voice-port configuration mode………. (voice-port configuration)
Dial-peer configuration mode………… (dial-peer configuring)
Encryption transform configuration mode…… (crypto transform-set configuration)
Encryption mapping configuration mode …….. (crypto map configuration)
IKE policy configuration mode………………. (isakmp configuration)
Pub key chain configuration mode………… (pubkey-chain configuration)
Pub key configuration mode……………… (pubkey-key configuration)
DHCP configuration mode ………………. (dhcp configuration)
configuring the router
Cons t r uct i ng l ocal
conf i gur at i on envi r onment
MAI PUROUTER
PC f or
conf i gur at i on
Conf i gur i ng
por t
Ser i al of PC
Cabl e of
conf i gur i ng pr ot
Parity ---no
Stop bit----1
Flow control---None
Power on the router, and press Enter key
then a prompt “router>”will be displayed on the terminal
Command Line Interface
Examples
router>help
1. Full help is available when you are ready to enter a command argument (e.g. 'show ?')
2. Partial help is provided when an abbreviated argument is entered and you want to know which
arguments match the input (e.g. 'show pr?'.)
3. Router # ? – this will give you list of commands in the privileged user mode
4. Or you can mention Router # Show ? - will show you list of commands work with show
parameters
5. like ------- Router # show llc2 --------- will show you LLC2 status…
Error Message of Command Line
Type “*** ?” for a list of subcommands The input command is not integrate.
Router System Configuration
Command Task
router(config)#user Maipu password 0 Maipu Add a user “Maipu” to the system with its
corresponding password “Maipu”
router(config)#user root password 0 root Add a user “root” to the system with its
corresponding password “root”
router#show user This will give you the list of configured user in the
router
• The configuration file of Maipu routers can be edited in a text editor (for example, wordpad)
• It can be downloaded to router through FTP or TFTP.
•This operation can be used by terminal users or through Telnet.
• The following example is given to explain how to download the router configuration file through FTP:
EXAMPLE
•Step 1: Edit the configuration file named config on a computer;
•Step 2: Starting the FTP SERVER on the computer;
•Step 3: Executing the command ftpcopy in the file configuration mode of the router to download from the
computer
The following command can be executed to save the current running configuration into the remote host throu
gh TFTP:
Before configuring interfaces, you should know of the follow points at least:
2. For a WAN interface, the link-layer encapsulation protocol and operational parameters
should be appointed between the WAN interface and the opposite-end interface
connected with the WAN interface.
4. Correctly configuring the static route of the destination network that can be reached
through the interface, or configuring the operational parameters of the dynamic
routing protocol on the interface.
5. If the interface supports the dialup mode, the dialup mapping and MODEM
management need be configured more.
Command Descriptions
router(config-if-fastethernet0)#ip address A.B.C.D mask Configure the IP address and sub-net mask
of the interface f0.
4) router(config-if-serial 0) # keepalive
8) router(config-if-serial 0) # exit
•A CE1 interface can be physically divided into 32 time-slots whose number is from 0 to 31 correspondingly.
Time-slot 0 can not be used to transmit data.
•Each frame of the CE1 circuit is composed of 32 time-slots and the transmission rate of each time-slot is 64K
•When a CE1 interface is used, the total time-slots (1~31) can be optionally divided into several groups.
After bounded together, each group of time-slots can serve as an logical interface (use the command
“channel-group”shell to realize it), supporting link-layer protocols such as PPP, X.25, HDLC and FR etc.
Configuring a CE1 interface -1
Configuring an interface.
Command Descriptions
Command Descriptions
router(config-controller)#f Use the configuration command of a framing controller to select a frame type for
raming crc4 the E1 data line. And the following types can be selected:
crc4: Specify the CRC4 check mode for the E1 interface to receive/transmit
data;
no-crc4: Specify the E1 interface not to adopt the CRC4 check mode for
receiving/transmitting data;
Default: Set the default type (CRC4 check is valid only for data transmission) .
router(config-controller)#lin Use the configuration command of a linecode controller to select a line encoding t
ecode hdb3 ype for the E1 line. And the following types can be selected:
Ami: Set the AMI (alternate mark inversion) as the line encoding type. E1 is inva
lid by default.
router(config-controller)# cl Use the configuration command of a clock source controller to select a line clock
ock source internal for the E1 line. And the following types can be selected.:
Internal: The CE1 interface provides clock source by itself;
Line: Extract the clock from the line. The type is valid by default.
router(config-controller)#pr The CE1 interface is configured as the PRI mode. After that, an interface similar to
i-group S0/0:15 can be generated.
Configuring a CE1 interface - 3
Command Descriptions
• Number: The channel-group number. When an E1 data line is configured, the scope of the channel-group number is
from 0 to 30.
• 2) Range: The value scope to which one or more time-slots in a channel-group belong. The first time-slot number
is 1, and its range is from 1 to 31.
• When a time-slot is configured, the time-slot-number of the start-time-slot must be more than that of the stop-time-slo
t,
or else, the time- slot-number is invalid.
• If two channels are configured with the repeating time-slot, the configuration is invalid and no interface can be
generated.
• When a time-slot is configured, the scope of the time-slot must match with a channel-group-number. And it is the
service provider that defines time-slots including a channel-group.
The following example defines three channel-groups: channel-group 0 includes a single time-slot, channel-group 2
Configuring a CE1 interface - 4
Command Descriptions
Command Descriptions
router(config-if)#exit
router(config-if)#end
Network Troubleshooting tools
Syslog Functions:-
router(config) # logging trap level <CR>
The system logging can record each level of prompts information. By default, the logging records nothing
but the information about the system unusable
router#show logging
The Context of syslog file:
%SYS-5-CONFIG-I:Configured from console by console
Monitoring the Ethernet Interface
• Entirely supporting SNMP v1&v2c standard, run in all TCP/IP network enviro
nment
• It adopts WinSock and WinSNMP for development and can be entirely compa
tible with Windows NT4/2000
Tools bar
Addresses bar
Topology
view
Message bar
Thank You