Professional Documents
Culture Documents
1. 2. 3. 4.
ISDN Details
ISDN NT-1 UNIT
ISDN Details:
Basic Rate Interface. An ISDN interface composed of two bearer channels (B channels) and one data channel (D channel) for circuit-switched communication of voice, video, and data.
The ISDN Network Termination provides basic rate ISDN access at the customer premises.
The NT1 unit provides the interface between the ISDN network and the ISDN terminal equipment in both point-to-point and point-to-multipoint configurations.
COMMANDS:
//TO REMOVE ISDN FROM BACKUP PNB/BRANCHNAME>config t PNB/BRANCHNAME(CONF)>interface [primary interface] PNB/BRANCHNAME(CONF)>no backup interface PNB/BRANCHNAME(CONF)>^Z PNB/BRANCHNAME>show ip interface brief // TO FIRE ISDN PNB/BRANCHNAME>isdn test call interface BRI 0/1/0[name] 23708268 PNB/BRANCHNAME>sh isdn active PNB/BRANCHNAME>sh ip eigrp neigbour PNB/BRANCHNAME>sh ip route [ip address] PNB/BRANCHNAME>sh backup PNB/BRANCHNAME>sh isdn status
//TO PUT ISDN IN BACKUP PNB/BRANCHNAME>config t PNB/BRANCHNAME(CONF)>interface [whose backup] PNB/BRANCHNAME(CONF)>backup delay 40 300 PNB/BRANCHNAME(CONF)>back interface [BRI NAME] PNB/BRANCHNAME(CONF)>^Z
Cisco Routers
Cisco 1721 Router
Supports 40MHz CPU processor Supports two 10/100 Fast Ethernet ports Supports Voice Supports Two WIC slots & one Network module slot . Performance 20Kbps The router is recommended for Network Center where 8 leased lines each of 64Kbps are terminating with one WIC-2T card which in turn connects to ZNC on leased line & WIC-1B-S/T for dialing to ZNC .
HUB
a.Hub works on single collision & broadcast domain. b. A collision domain is a group of devices residing on the same physical media. It can send signals onto media & these signals can collide.
c. When a HUB receives a packet, it transmits packet to all of its ports . If two or more PCs on network try to send packets at same time , a collision is said to occur. Also, bandwidth is shared by all of PCs connected to HUB.
d. HUB operates in Half Duplex and at layer-1(Physical Layer) of OSI model.
SWITCH
a. Switch automatically divides the network into multiple segments. It accomplishes this by maintaining a table of each destination address & its port. When the switch receives a packet, it reads the destination address from header information in packet ,establishes a temporary connection between source & destination ports , sends the packet on its way & then terminates the connection. b. Switch operates in Full Duplex mode & layer-2 (Data Link Layer) of OSI model. c. CAT5 / CAT5e / CAT6 are UTP (unshielded twisted pair) cable ratings. The higher the number, the higher the max throughput. Cat5 = 100Mbps, Cat5e =200Mbps, Cat6=1000Mbps (gigabit).
SUBNETTINIG:
Subnetting treats a subdivision of a single class A, B, or C network as if it were a network itself. By doing so, a single class A, B, or C network can be subdivided into many non overlapping subnets. Subnetting an IP Network can be done for a variety of reasons, including organization, use of different physical media (such as Ethernet, FDDI, WAN, etc.), preservation of address space, and security. The most common reason is to control network traffic.
VLSM:
Technique that allows network administrators to divide an IP address space into subnets of different sizes, unlike simple same-size Subnetting. VLSM is the breaking down of IP addresses into subnets (multiple levels) and allocating it according to the individual need on a network. It can also be called a classless IP addressing. In a single class A, B, or C multiple subnet masks can be used. Routing protocols that do not support VLSM do not include mask in their routing updates.
VLSM Example:
New Delhi: Two networks to support 25 hosts each. Gurgaon: 5 hosts in one and 10 hosts in another. Connect ND to Gurgaon. Subnet out VLSM out of network 128.186.1.0/24
#Hosts ND_1 ND_2 25 25 #Host bits 5 5 #Usable Hosts 32 32 Subnets /27 /27
Gurgaon_1
Gurgoan_2 WAN
10
5 2
4
3 2
16
8 4
/28
/29 /30
VLSM example:
We start with network that needs most host. ND_1: 25 hosts needed. ND_2: 25 hosts needed. Number of bits required to cover the amount of hosts=2^5 8-5=3 (Number of hosts bit borrowed) 11111111.11111111.11111111.111 00000 The last 3 bits add up to 128+64+32=224 Most important bit is 32 which shows our subnet size. Our n/w will be in increments of 32 for this mask. Our subnet mask will be now 255.255.255.224 or /27 ND_1=128.186.1.0/27 128.186.1.31/27 ND_2=128.186.1.32/27 128.186.1.63/27
Cont.
Next we go to next highest host amount. Gurgaon_1 : 10 hosts Number of bits required to cover the Host= 2^4=16 8-4=4 bits need to be borrowed. 11111111.11111111.11111111.1111 0000 The last 4 bits add up to 128+64+32+16=240 Most important bit is 16. Our subnet mask is now 255.255.255.240 or /28 Gurgaon_1= 128.186.1.64/28 128.186.1.79/28
Cont.
Continuing the same way we get:
Network address
ND_1 ND_2 Gurgaon_1 128.126.1.0
Subnet Mask
Gurgaon_2
WAN
128.126.1.80 128.126.1.81
128.126.1.88 128.126.1.89
128.126.1.86
128.126.1.90
128.126.1.87 255.255.255.248
128.126.1.91 255.255.255.252