Ccna Slides
Ccna Slides
Networking Basics
How a LAN Is Built
PC or Workstation
Loaded with NOS
Network Interface Card
• Amplifies electronic signals
• Packages data for transmission
• Physically connects computer to
transmission
media (cable)
PC or Workstation
Loaded with NOS
Connector Port
Network Interface
Card (NIC)
1990s—Global Internetworking
L: Dutch Information
Ik hou for the
Remote
van Translator
konijnen
Fax #:---
Fax #:--- Information L: Dutch
L: Dutch for the Ik hou
Ik hou Remote
van
van Secretary
konijnen
konijnen
Layered Communication
Location A Location B
Layers
I like J’aime
rabbits
Message
3 les lapins
Fax #:---
Fax #:--- Information L: Dutch
L: Dutch for the Ik hou
Ik hou remote
van secretary 1 van
konijnen
konijnen
Why a Layered Network Model?
7 Application
6 Presentation
NIC Card
5 Session
4 Transport
3 Network
2 Data Link
1 Physical Hub
Host Layers
}
7 Application
6 Presentation Host layers: Provide
5 Session accurate data delivery
between computers
4 Transport
Network
3 Data Link
1 Physical
Media Layers
}
7 Application
6 Presentation Host layers: Provide
5 Session accurate data delivery
between computers
4
Transport
3
2
1
Network
Data Link
Physical
} Media layers: Control
physical delivery of messages
over the network
Layer Functions
7 Application Provides network services to
application processes (such as
electronic mail, file transfer, and
terminal emulation)
Layer Functions
7 Application Network services to applications
Host A Host B
7 Application Application
6 Presentation Presentation
5 Session Session
4 Transport Segments Transport
3 Network Packets Network
2 Data Link Frames Data Link
1 Physical Bits Physical
Application Layer
• This is where users communicate to the
computer.
• This is where communication between two
users are established.
• This is a point where user or application
interfaces with the protocols to gain access to
the network.
• Examples are WWW, Telnet, FTP, TFTP, E-
mail, SNMP, DNS
Presentation Layer
– Session Establishment
•Establishes a session between two devices before actual
transmission of data.
– Dialog Control
•Simplex
•Half Duplex
•Full Duplex
Session Layer
• Simplex
– Data travels only one way.
• Radio transmission is the best example of this.
• Half Duplex
– Both way but one at a time. By default all LAN Cards (NICs)
work on Half Duplex.
• Full Duplex
– Both way at the same time.
Session Layer
• Network File System (NFS)
• Structured Query Language (SQL)
• Remote-Procedure Call (RPC)
• X Window System
• AppleTalk Session Protocol (ASP)
• DEC Session Control Protocol (SCP)
Service Request
Service Reply
• Coordinates applications as
they interact on different hosts
Transport Layer
• Segments upper-layer applications
• Establishes an end-to-end connection
• Sends segments from one end host to another
• Optionally, ensures data reliability
Transport Layer
• Transport Layer never actually transports the data but only
prepares for transporting.
• Uses Socket to define the services running on a particular
node, the data is associated with.
• Responsible for the following :
– Segmentation
– End-to-end Communication
– Flow Control
– Error Control
– Multiplexing of Applications
• TCP, UDP and SPX work at this layer
Socket
• Socket is a software component and points to a particular service running
on a particular node.
• Structure of a socket
– IP Address + Port Address
• Each service has a unique Port address
• Max. Port Addresses can be 65,536
• Port address 1-1023 is reserved for specific Services like
– WWW - 80
– FTP - 21
– SMTP - 25
• Port Addresses are reserved for standardization purpose.
Transport Layer—
Segments Upper-Layer
Applications
Application Electronic File Terminal
Session
Segments
Port Numbers
F T S D T S R
Application T E M N F N I
Layer P L T S T M P
N P P P
E
T
Sender Receiver
Buffer Full
Not Ready
Stop
Process
Segments
Go Ready
Buffer OK
Resume Transmission
Flow Control
Sender Receiver
Synchronize
Negotiate Connection
Synchronize
Acknowledge
Connection Established
Data Transfer
(Send Segments)
End-to-End Communication
• Connection Less Transmission
– UDP is used
– Not reliable
– Faster
• Connection Oriented Transmission
– TCP or SPX is used
– Reliable
– Slower
Connection Oriented Protocol
• Window Size = 3
Send 1 Receive 1
Send 2 Receive 2
Sender
Send 3 Receive 3 Receiver
Ack 4
Send 4
Transport Layer—
An Acknowledgement Technique
Sender Receiver
1 2 3 4 5 6 7 1 2 3 4 5 6 7
Send 1
Send 2
Send 3
Ack 4
Send 4
Send 5
Send 6
Ack 5
Send 5
Ack 7
Connection Less Protocol
• They do not provide acknowledgement neither
sequence numbers.
• Eg. UDP
Network Layer
• It is responsible for communicating Networks
• It recognizes Networks with the help of Netwok Addresses
– Network Address is a logical address like IP Address or IPX Address
– It is common for a group of computers
• It works only with Network IDs and has got nothing to do with host Ids.
• Path determination or Routing is performed at this layer.
• Router works at this layer.
Network Layer: Path
Determination
Which
Which Path?
Path?
5
2 9
6 8
4
10 11
1 3
7
Network Node
1 1
2.1
2
3 1.2
3 1
Network Host
TCP/IP
Example 10. 8.2.48 (Mask 255.0.0.0)
Network Node
Novell IPX
Example 1aceb0b. 0000.0c00.6e25
Network Layer
Protocol Operations
X Y
C
C
A
A
• Routing protocol
used only between
routers to maintain
routing tables
Examples: RIP, IGRP, OSPF
Static Versus Dynamic Routes
Static Route
Uses a protocol route that a network
administrator enters into the router
Dynamic Route
Uses a route that a network protocol
adjusts automatically for topology or
traffic changes
Static Route Example
Point-to-point or
A
A circuit-switched
connection
“Stub” network
• Fixed route to address reflects
administrator’s knowledge
Adapting to Topology Change
A
A B
B
D
D C
C
A
A B
B
X
D
D C
C
Adapting to Topology Change
A
A B
B
X
D
D C
C
• Ethernet
Token
• Token Ring Ring
FDDI
• FDDI Dual Ring
Ethernet
D
Application
Presentation
Session
Transport
Network
Data Link
Physical
Ethernet Operation
A B C D
D B and C
Application Application
Presentation Presentation
Session Session
Transport Transport
Network Network
Data Link Data Link
Physical Physical
Ethernet LANs:
How do they work?
• Multiple workstations
are connected to a
“segment”
• Each station has to take
turns sending traffic
• All stations listen to all
traffic on their segment
• Stations can only send
data (Ethernet Frames)
when no one else is
sending
Ethernet LANs:
MAC Addresses
0000.0c12.3456
• Some Ethernet frames
are sent to all stations
• These are called
“broadcast” frames
Frame
To: FFFF.FFFF.FFFF
• All stations process
this frame
0000.1018.321a 0000.0c12.1111
Flow Control Mechanism
on Ethernet
• CSMA/CD is the
mechanism that
Frame Packet
regulates the segment
• Each station listens for
other traffic before they
transmit
Ethernet Collisions
Collision!
Packe
• Sometimes stations
Frame Packe
Frame t
t transmit
Frame Packet Frame Packet
simultaneously
• Two frames on the
same segment collide
• Collisions require
each station to wait
and resend
Ethernet Reliability
A B C D
Figure 1
A B C D
Figure 2
Collision
Ethernet Reliability
A B C D
Collision
A B C D
Collision
A B C D
24 bits 24 bits
Organizationally
Unique Identifier (OUI) Vender Assigned
(Assigned by IEEE)
Ethernet Addressing using MAC Addresses
Ethernet and IEEE 802.3
• Benefits and background
– Ethernet is the most popular physical layer LAN technology because it
strikes a good balance between speed, cost, and ease of installation
– Supports virtually all network protocols
– Xerox initiated, then joined by DEC & Intel in 1980
• Revisions of Ethernet specification
– Fast Ethernet (IEEE 802.3u) raises speed from 10 Mbps to 100 Mbps
– Gigabit Ethernet is an extension of IEEE 802.3 which increases speeds to
1000 Mbps, or 1 Gbps
Ethernet and IEEE 802.3
Ethernet II
uses “Type”
0000.0C xx.xxxx here and
does not use
IEEE assigned Vendor 802.2.
assigned
MAC Address
Preamble
• It allows the receiving devices to lock the
incoming bit stream.
• The Peamble is used to indicate to the
receiving station that the data portion of
the message will follow.
Destination Address (DA)
• DA is used by receiving stations to determine
if an incoming packet is addressed to a
particular node.
• Uses LSB (Least Significant Bit) first
• Destination can be individual, multicast or
broadcast
– Broadcast will be all 1s or Fs and will be sent to
all.
– Multicast will be sent to the specific subnet
Source Address (SA)
• SA is a 48 bit MAC Address supplied by
the transmitting device.
• Broadcast and Multicast address formats
are illegal within the SA fields.
• It uses LSB (Least significant bit first)
Length or Type Field
• 802.3 uses length field where as Ethernet frame
uses type field to identify the network layer
protocol.
OR 802.2 (SAP)
# Bytes 1 1 1 or 2 Variable
Dest Source
Ctrl Data
SAP SAP
BNC Connector
Speed and throughput: 10/100 Mbps
Relative cost: More than UTP, but still low
Media and connector size: Medium
Maximum cable length: 200/500 m
Fiber-Optic Cable
Plastic
Kevlar Reinforcing
Outer Jacket Shield Glass Fiber
Material
and Cladding
“Base” = baseband
“Broad” = broadband
Cable Specification
8 1
Hub/Switch Server/Router
1 8
Pin Label Pin Label
1 TD+ 1 8 1 8
1 RD+
2 RD- 2 TD-
3 TD+ 3 RD+
4 NC 4 NC
5 NC 5 NC w g w b w o w br w g w b w o w br
g o b br
g o b br
6 TD- 6 RD-
7 NC 7 NC Wires on cable ends
8 NC 8 NC
are in same order
UTP Implementation
Crossover
Cable 10BaseT/
100BaseT Crossover Crossover Cable
Hub/Switch Hub/Switch 8 1
Pin Label Pin Label 1 8
1 RD+ 1 RD+ 8 1 8 1
2 RD- 2 RD-
3 TD+ 3 TD+
4 NC 4 NC
5 NC 5 NC w ww w
br b o g
br w g w b w o w
6 TD- g br o b
6 TD- br b g o
7 NC 7 NC Some wires on cable
8 NC 8 NC
ends are crossed
CISCO MODEL
Network Structure Defined by
Hierarchy
Core Layer
Distribution
Layer
Access
Layer
118
The Three Layers are :
•Core Layer
•Distribution Layer
•Access Layer
Core Layer Characteristics
Core Layer
• No packet manipulation
120
Core Layer
Access Layer
125
The Access Layer
• Access Layer controls users and workgroup
access to network resources.
• This layer is also referred to as Desktop
Layer.
• Continues access control and policies from
distribution layer
• Creation of separate collision domains
(segmentation)
• Workgroup connectivity into the distribution
layer
© 2002, Cisco Systems, Inc. All rights reserved.
UPPER LAYER PROTOCOLS
What Is TCP/IP?
• A suite of protocols
• Rules that dictate how packets
of information are sent across
multiple networks
• Addressing
• Error checking
TCP/IP Protocol
• The Transmission Control Protocol/Internet Protocol (TCP/IP)
suit was created by the Department of Defense (DoD).
• The Internet Protocol can be used to communicate across
any set of interconnected networks.
• TCP/IP supports both LAN and WAN communications.
• IP suite includes not only Layer 3 and 4 specifications but
also specifications for common applications like e-mail,
remote login, terminal emulation and file transfer.
• The TCP/IP protocol stack maps closely to the OSI model in
the lower layers.
The DoD & OSI
DoD Model OSI Model
Application
Application Presentation
Session
Host-to-Host Transport
Internet Network
Network Data Link
Access Physical
TCP/IP Protocol Suit at DoD
DoD Model TCP/IP Protocol Suit
Telnet FTP LPD SNMP
Process /
Application TFTP SMTP NFS X Window
Options (0 or 32 if Any)
Transport
TCP UDP
Layer
6 17 Protocol
Numbers
Internet
Layer IP
172.16.3.1 172.16.3.2
172.16.3.1 172.16.3.2
172.16.3.1 172.16.3.2
IP: 172.16.3.2
Ethernet: 0800.0020.1111
Address Resolution Protocol
I need the
I heard that broadcast.
Ethernet
The message is for me.
address of
Here is my Ethernet
176.16.3.2.
address.
172.16.3.1 172.16.3.2
IP: 172.16.3.2
Ethernet: 0800.0020.1111
Map IP Ethernet
RARP (Reverse ARP)
• This also works at Internet Layer.
• It works exactly opposite of ARP
• It resolves an IP address with the help of a
known MAC addres.
• DHCP is the example of an RARP
implementation.
• Workstations get their IP address from a RARP
server or DHCP server with the help of RARP.
Reverse ARP
What is
my IP
address?
Ethernet: 0800.0020.1111
IP: 172.16.3.25
Reverse ARP
I heard that
broadcast.
What is
Your IP
my IP
address is
address?
172.16.3.25.
Ethernet: 0800.0020.1111
IP: 172.16.3.25
•Map Ethernet IP
Bootstrap Protocol (BootP)
Application
Transport Destination
1 Unreachable
ICMP
Echo (Ping)
Internet
Other
Data-Link
Physical
ICMP Ping
Transport Layer Overview
Data-Link
Physical
Transmission Control Protocol
(TCP)
• TCP works at Transport Layer
Options (0 or 32 if Any)
Data (Varies)
TCP Segment Format
• Source port – Number of the calling port
• Destination Port – Number of the called port
• Sequence Number – Number used to ensure correct sequencing of the
arriving data
• Acknowledgement Number – Next expected TCP octet
• Header Length – Length of the TCP header
• Reserved – Set to zero
• Code Bits – Control Functions (setup and termination of a session)
• Window – Number of octets that the sender is willing to accept
• Checksum – Calculated checksum of the header and data fields
• Urgent Pointer – Indication of the end of the urgent data
• Options – One option currently defined (maximum TCP segment size)
• Data – Upper layer protocol data
Port Numbers
F T S D T S R
T E M N F N I
Application P
P L T S T M
Layer
N P P P
E
T
Source Destination
…
Port Port
Telnet Z
Host A Host Z
Send SYN
1
(seq = 100 ctl = SYN)
SYN Received
Send 2
Receive 2
Send ACK 3
Receive ACK 3
Send 3
Receive 3
• Window Size = 1
TCP Sequence and
Acknowledgment Numbers
Source Destination Sequence Acknowledgment
…
Port Port
I just
sent number I just got number
10 10, now I need
number 11.
172.18.0.1 172.16.0.1
172.18.0.2 172.16.0.2
HDR SA DA DATA
10.13.0.0 192.168.1.0
10.13.0.1 172.17.0.1 172.17.0.2 192.168.1.1
• 32-bit addresses
• Commonly expressed in dotted
decimal format (e.g., 192.168.10.12)
• Each “dotted decimal” is commonly
called an octet (8 bits)
IP Addressing
32 bits
Dotted
Decimal Network Host
64
32
128
16
8
4
2
1
128
64
32
16
8
4
2
1
1
128
64
32
16
8
4
2
128
64
32
16
8
4
2
1
IP Addressing
32 bits
Dotted
Decimal Network Host
1
128
64
32
16
8
4
2
2
128
64
32
16
8
4
1
16
4
128
64
32
8
4
2
1
128
64
32
16
8
2
1
Example
Decimal 172 16 122 204
Example 10101100 00010000 01111010 11001100
Binary
IP Address Classes
8 bits 8 bits 8 bits 8 bits
•Class D: Multicast
•Class E: Research
IP Addressing—Class A
• 10.222.135.17
• Network # 10
• Host # 222.135.17
• Range of class A network IDs: 1–126
• Number of available hosts: 16,777,214
IP Addressing—Class B
• 128.128.141.245
• Network # 128.128
• Host # 141.245
• Range of class B network IDs:
128.1–191.254
• Number of available hosts: 65,534
IP Addressing—Class C
• 192.150.12.1
• Network # 192.150.12
• Host # 1
• Range of class C network IDs:
192.0.1–223.255.254
• Number of available hosts: 254
IP Network Address Classes
Class # Networks # Hosts Example
Class B 128.5.0.0
Network Address Space
Class C 132.33.33.0
IP Address Classes
Bits: 1 8 9 16 17 24 25 32
0NNNNNNN Host Host Host
Class A:
Range (1-126)
Bits: 1 8 9 16 17 24 25 32
10NNNNNN Network Host Host
Class B:
Range (128-191)
1 8 9 16 17 24 25 32
Bits:
110NNNNN Network Network Host
Class C:
Range (192-223)
1 8 9 16 17 24 25 32
Bits:
1110MMMM Multicast Group Multicast Group Multicast Group
Class D:
Range (224-239)
Private Addresses
13
4
3
16
15
14
12
11
10
9
8
7
6
5
2
1
10101100 00010000 00000000 00000000 1
00000000 00000001 2
00000000 00000011 3
...
...
...
11111111 11111101 65534
11111111 11111110 65535
11111111 11111111 65536
- 2
2N-2 = 216-2 = 65534 65534
Subnet Mask
Network Host
IP
Address
172 16 0 0
Network Host
Default
Subnet
Mask
255 255 0 0
11111111 11111111 00000000 00000000
Also written as “/16” where 16 represents the number of 1s
in the mask.
Network Subnet Host
8-bit
Subnet 255 255 255 0
Mask
Also written as “/24” where 24 represents the number of 1s
in the mask.
Decimal Equivalents of Bit
Patterns
128 64 32 16 8 4 2 1
1 0 0 0 0 0 0 0 = 128
1 1 0 0 0 0 0 0 = 192
1 1 1 0 0 0 0 0 = 224
1 1 1 1 0 0 0 0 = 240
1 1 1 1 1 0 0 0 = 248
1 1 1 1 1 1 0 0 = 252
1 1 1 1 1 1 1 0 = 254
1 1 1 1 1 1 1 1 = 255
Subnet Mask without Subnets
Network Host
Network
172 16 0 0
Number
255
128
192
224
240
248
252
254
Network
Number 172 16 2 0
255
255
128
192
224
240
248
252
254
128
192
224
240
248
252
254
Network
Number 172 16 2 128
255.255.255.192 Mask
Subnet 4
Broadcast
First
Last
Addressing Summary Example
172 16 2 160
Subnet
Broadcast
First
Last
Addressing Summary Example
172 16 2 160
Subnet
Broadcast
First
Last 7
Addressing Summary Example
172 16 2 160
10000000 Subnet 4
Broadcast
First
Last
Addressing Summary Example
172 16 2 160
10000000 Subnet 4
10111111 Broadcast
5
First 6
Last
Addressing Summary Example
172 16 2 160
10000000 Subnet 4
10111111 Broadcast
5
10000001 First 6
Last
Addressing Summary Example
172 16 2 160
10000000 Subnet 4
10111111 Broadcast
5
10000001 First 6
10111110 Last 7
Addressing Summary Example
172 16 2 160
HQ
172.16.0.0/16
What Is a Variable-Length
Subnet Mask? (cont.)
HQ
HQ
172.16.0.0/16
What Is a Variable-Length
Subnet Mask? (cont.)
172.16.14.32/27
A
172.16.14. 64/27
B
HQ
HQ
172.16.0.0/16
172.16.14.96/27
C
172.16.14.32/27
A
172.16.14. 64/27
B
HQ
HQ
172.16.0.0/16
172.16.14.96/27
172.16.32.0/26
172.16.32.64/26
172.16.32.128/26
172.16.32.192/26
26 bit mask
(62 hosts)
A Working VLSM Example
(cont.)
Derived from the 172.16.32.0/20 Subnet
172.16.32.0/26
172.16.32.64/26
172.16.32.128/26
172.16.32.192/26
Derived from the
172.16.33.0/26 Subnet
172.16.32.0/26
172.16.33.0/30
172.16.32.64/26
172.16.33.4/30
172.16.33.8/30
172.16.32.128/26
172.16.33.12/30
172.16.32.192/26
Derived from the
172.16.33.0/26 Subnet
172.16.25.0/24
172.16.26.0/24
A
172.16.27.0/24
Routing table
172.16.25.0/24
172.16.26.0/24
172.16.27.0/24
What Is Route
Summarization? (cont.)
172.16.25.0/24
I can route to the
172.16.0.0/16 network.
172.16.26.0/24
A B
172.16.27.0/24 Routing Table
Routing Table 172.16.0.0/16
172.16.25.0/24
172.16.26.0/24
172.16.27.0/24
172.16.32.64/26
172.16.32.0/24 Corporate
Network
C A
172.16.0.0/16
172.16.32.128/26
D
172.16.64.0/20
Classless
Interdomain Routing
192.168.8.0/24 A
192.168.9.0/24
B
192.168.8.0/21
192.168.9.0/24 ISP
192.168.15.0/24
H
Service
Provider
Modem Modem
WAN
Telecommuters Basic
Telephone Server
Service Modem
Access Router
• Widely available
Mobile
Users
• Easy to set up
• Dial on demand
• Asynchronous transmission
• Low cost, usage-based
• Lower bandwidth access requirements
Integrated Services Digital
Network (ISDN)
LAN
ISDN Server
BRI BRI/PRI
Telecommuter/After- 2B+D 23B+D
Hours, Work-at- 30B+D (Europe)
Home
• High bandwidth Company Network
Modem Modem
WAN
Legend
FastEthernet/
Ethernet
ISDN
Dedicated
ISL
Core_
core_sw_b core_sw_b
core_sw_a
Server
Leased Line/
ISDN Cloud Frame Relay
WAN Physical Layer
Implementations
• Physical layer implementations vary
• Cable specifications define speed of link
Frame
HDLC
Relay
PPP
EIA/TIA-232 RJ-45
EIA/TIA-449 NOTE: Pinouts are
X.21 V.24 V.35 different than RJ-45
HSSI used in campus
Differentiating Between WAN
Serial Connectors
End user Router connections
device
DTE
CSU/ DCE
DSU
Service
provider EIA/TIA-232 EIA/TIA-449 V.35 X.21 EIA-530
Network connections at the CSU/DSU
Serial Implementation of
DTE versus DCE
Data Terminal Equipment Data Communications Equipment
End of the user’s device • End of the WAN provider’s
on the WAN link side of the communication facility
• DCE is responsible for clocking
Modem
CSU/DSU
DTE DCE
S S
S
S
S S
DTE DCE DCE DTE
WAN Terminating Equipment
Physical Cable Types
EIA/TIA-232 WAN Provider
V.35 (Carrier) Network
X.21
Router HSSI
To Corporate
Network Modem
Usually on the
Customer’s
Premises
DTE DCE
Data Terminal Equipment Data Circuit-Terminating Equipment
The Customer’s The Service Providers
Equipment Equipment
Serial Transmission
• WAN Serial connectors use serial transmission
– Serial transmission uses one bit at time over a
single channel.
– Parallel transmission can use 8 bits at a time,
but all WANs use serial transmission.
• Cisco Routers use a proprietary 60 pin serial
connector.
– Connector at the other end of the cable will
depend on your service provider or end device
requirements.
LAN/WAN Devices
• Hubs
• Bridges
• Switches
• Routers
Hub
124
127
Hub
125
128
• Amplifies signals
• Propagates signals through the network
• Does not filter data packets based on destination
• No path determination or switching
• Used as network concentration point
Hubs Operate at Physical layer
Physical
A B C D
Bridge
124
127
Hub Hub
125
128
Corporate Intranet
Segment 1 Segment 2
1 2 3 4 OR 1 2
Switch
Memory
• Each segment has its
own collision domain
• Broadcasts are
forwarded to all
segments
Routers
2.1 2.2
1.3 4.3
1.2 4.2
E0 S0 S0 E0
Mobile User
Branch Office
Main Office
Internet
Network Device Domains
Hub Bridge Switch Router
Collision Domains:
1 4 4 4
Broadcast Domains:
1 1 1 4
© 2002, Cisco Systems, Inc. All rights reserved.
Product Selection
Considerations
• Provides functionality and features you need today
• Capacity and performance
• Easy installation and centralized management
• Provides network reliability
• Investment protection in existing infrastructure
• Migration path for change and growth
• Seamless access for mobile users and
branch offices
Cisco Router Products
Cisco
Selection Issues: 12000 GSR
Series
• Scale of the routing features needed Cisco
10000
• Port density/variety requirements Cisco Series
AS 7000
• Capacity and performance 5000 Series
Series
Cisco
• Common user interface
3600
Cisco Series
2600 Central Site Solutions
Cisco Series
2500
Cisco Series
1600/1700 Branch Office Solutions
Cisco Series
700/800
Series Small Office Solutions
At any point you may enter a question mark '?' for help.
Use ctrl-c to abort configuration dialog at any prompt.
Default settings are in square brackets '[]'.
hostname Router
interface BRI0
enable secret 5 $1$/CCk$4r7zDwDNeqkxFO.kJxC3G0
shutdown
enable password sanfran
no ip address
line vty 0 4
!
password sanjose
interface Ethernet0
no snmp-server
no shutdown
!
ip address 10.1.1.31 255.255.255.0
no appletalk routing
no mop enabled
no decnet routing
!
ip routing
interface Serial0
no clns routing
shutdown
no ipx routing
no ip address
no vines routing
<text omitted>
no xns routing
end
no apollo routing
isdn switch-type basic-5ess
[0] Go to the IOS command prompt without saving this config.
[1] Return back to the setup without saving this config.
[2] Save this configuration to nvram and exit.
Router# cl?
clear clock
Router# clock
• Symbolic translation
% Incomplete command.
• Command prompting
Router# clock ?
set Set the time and date • Last command recall
Router# clock set
% Incomplete command.
Translating "CLOK"
% Unknown command
Router#or computer
clock name,
set or unable to find computer address
19:56:00
% Incomplete command.
Router#
clear Router#
clock clock set 19:56:00 ?
• Command
<1-31> Day of the month
Router# MONTH Month of the year
prompting
% Incomplete command.
Router> terminal history size lines Set session command buffer size
show version Command
wg_ro_a#show version
Cisco Internetwork Operating System Software
IOS (tm) 2500 Software (C2500-JS-L), Version 12.0(3), RELEASE SOFTWARE (fc1)
Copyright (c) 1986-1999 by cisco Systems, Inc.
Compiled Mon 08-Feb-99 18:18 by phanguye
Image text-base: 0x03050C84, data-base: 0x00001000
Config Config
IOS
show show
running-config startup-config
Console
Setup utility
Configuration
Mode Prompt
Interface Router(config-if)#
Subinterface Router(config-subif)#
Controller Router(config-controller)#
Line Router(config-line)#
Router Router(config-router)#
IPX router Router(config-ipx-router)#
Saving Configurations
wg_ro_c#
wg_ro_c#copy running-config startup-config
Destination filename [startup-config]?
Building configuration…
wg_ro_c#
Router Name
Router(config)#hostname wg_ro_c
wg_ro_c(config)#
Interface Description
wg_ro_c(config)#interface ethernet 0
wg_ro_c(config-if)#description Engineering LAN, Bldg. 18
Enable Password
Router(config)#enable password cisco
Secret Password
Router(config)#enable secret sanfran
Other Console Line Commands
Router(config)#line console 0
Router(config-line)#exec-timeout 0 0
Router(config)#line console 0
Router(config-line)#logging synchronous
Router(config-if)#exit
Router(config)#interface serial 0
Specify interface Router(config-if)#
Configuring a Serial Interface
Router#configure term
•Enter global Router(config)#
configuration mode
Router(config)#interface serial 0
Specify interface Router(config-if)#
Router#configure term
Router(config)#interface serial 0
Router(config-if)#no shutdown
%LINK-3-UPDOWN: Interface Seria0, changed state to up
%LINEPROTO-5-UPDOWN: Line Protocol on Interface Serial0, changed state to up
Hardware is HD64570
Description: 64Kb Line to San Jose
:: :: :: :: :: :: :: :: ::
E0
S0
172.16.1.0
SO
Network A B
B
172.16.2.2 172.16.2.1
172.16.1.0
SO
Network A BB
172.16.2.2 172.16.2.1
This route allows the stub network to reach all known networks
beyond router A.
Static Routing
• Static Routing is the process of an administrator manually adding routes in each
router’s routing table.
• Benefits of Static Routing
– No overhead on the Router CPU
– No Bandwidth usage between routers
– Security (Administrator can allow routing to selected networks)
• Disadvantage of Static Routing
– The administrator must really understand the full internetwork to configure
routes correctly.
– If one network is added to the internetwork the administrator must add a route
to it on all routers.
– It is not feasible in large networks because it would be a full-time job.
© 2002, Cisco Systems, Inc. All rights reserved.
Dynamic Routing Basics
Routed versus Routing
Protocols
• Routed protocols
used between
routers to direct user
traffic; also called
network protocols
– Examples: IP, IPX,
DECnet, AppleTalk,
NetWare, OSI, VINES
• Routing protocols
Network Destination Exit Port
used between Protocol Network to Use
routers to maintain
Protocol name 1.0 1.1
routing tables 2.0 2.1
– Examples: RIP, IGRP, 3.0 3.1
OSPF, BGP, EIGRP
DYNAMIC ROUTING
A B A B
X D
X D
C C
10.120.2.0 172.16.1.0
Routed Protocol: IP
Routing protocol: RIP, IGRP
Autonomous Systems: Interior or
Exterior Routing Protocols
IGPs: RIP, IGRP EGPs: BGP
Router A Router B
RIP
Administrative
Distance=120
E
Router C Router D
Distance Vector versus Link
State
• Distance vector
– Sends routing table info only to neighbors, so change
communication may need one min/router
– Also called “routing by rumor”
– Easy to configure, but slow
• Link state
– Floods routing information about itself to all nodes, so
changes are known immediately
– Efficient, but complex to configure
• Cisco’s EIGRP hybrid
– Efficient and easy to configure
Routing Protocol Evolutions
EIGRP
• Hybrid protocol
IGRP • Developed by Cisco
• Distance vector • Superior convergence
• Developed by Cisco and operating efficiency
• Addresses problems in • Merges benefits of link
large, heterogeneous state & distance vector
RIP
networks
• Distance vector
• Most common IGP
• Uses hop count OSPF
• Link state, hierarchical
• Successor to RIP
• Uses least-cost routing,
Distance Vector multipath routing, and
load balancing
Hybrid • Derived from IS-IS
Link State
Classes of Routing Protocols
B
Distance Vector
C A
Hybrid Routing
B
Link State
C A
D
Distance Vector Routing
Protocols
B
C A
Distance—How far
Vector—In which direction D
D C B A
Bandwidth
56
RIP Delay
Hop count
T1 56
T1
Topology
change
causes
routing
A table
update
Network 10.4.0.0
Update after is unreachable
hold-down Time
10.1.0.0 10.2.0.0 10.3.0.0 10.4.0.0
E0 A S0 S0 B S1 S0 C E0 X
Update after
hold-down Time Network 10.4.0.0 is down
then back up
then back down
10.4.0.0
E B X C
A
Implementing Solutions in
Multiple Routes (cont.)
Holddown
10.4.0.0
E B X C
Holddown
Holddown
Implementing Solutions in
Multiple Routes (cont.)
Holddown
Poison Reverse
D
Poison Reverse
10.4.0.0
E B X C
Holddown
Poison Reverse
Poison Reverse
A
Holddown
Implementing Solutions in
Multiple Routes (cont.)
Holddown
10.4.0.0
E B X C
Holddown
Packet for
Packet for Network 10.4.0.0
Network 10.4.0.0
A
Holddown
Implementing Solutions in
Multiple Routes (cont.)
10.4.0.0
E B C
Link up!
A
Implementing Solutions in
Multiple Routes (cont.)
10.4.0.0
E B C
Link up!
A
Link-State Routing Protocols
B
C A
D
Link-State Packets
Topological
Database
Routing
SPF Table
Algorithm
Network 172.16.0.0
RIP
• Router configuration
– Select routing protocols IGRP, IGRP
RIP
– Specify networks or
Network
interfaces 160.89.0.0
RIP
Network 172.30.0.0
Dynamic Routing Configuration
Router(config-router)#network network-number
19.2 kbps
T1 T1
T1
Router(config)#router rip
Router(config-router)#network network-number
router rip
2.3.0.0 router rip
2.3.0.0
network 172.16.0.0 network 192.168.1.0
network 10.0.0.0 network 10.0.0.0
router rip
network 10.0.0.0
Verifying the Routing Protocol—
RIP
E0 S2 S2 S3 S3 E0
172.16.1.0 A 192.168.1.0
B C
172.16.1.1 10.1.1.1 10.1.1.2 10.2.2.2 10.2.2.3 192.168.1.1
RouterA#sh ip protocols
Routing Protocol is "rip"
Sending updates every 30 seconds, next due in 0 seconds
Invalid after 180 seconds, hold down 180, flushed after 240
Outgoing update filter list for all interfaces is
Incoming update filter list for all interfaces is
Redistributing: rip
Default version control: send version 1, receive any version
Interface Send Recv Key-chain
Ethernet0 1 1 2
Serial2 1 1 2
Routing for Networks:
10.0.0.0
172.16.0.0
Routing Information Sources:
Gateway Distance Last Update
10.1.1.2 120 00:00:10
Distance: (default is 120)
Displaying the
IP Routing Table
E0 S2 S2 S3 S3 E0
172.16.1.0 A 192.168.1.0
B C
172.16.1.1 10.1.1.1 10.1.1.2 10.2.2.2 10.2.2.3 192.168.1.1
RouterA#sh ip route
Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B -
BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP
i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, * - candidate
default
U - per-user static route, o - ODR
T - traffic engineered route
RouterA#debug ip rip
RIP protocol debugging is on
RouterA#
00:06:24: RIP: received v1 update from 10.1.1.2 on Serial2
00:06:24: 10.2.2.0 in 1 hops
00:06:24: 192.168.1.0 in 2 hops
00:06:33: RIP: sending v1 update to 255.255.255.255 via
Ethernet0 (172.16.1.1)
00:06:34: network 10.0.0.0, metric 1
00:06:34: network 192.168.1.0, metric 3
00:06:34: RIP: sending v1 update to 255.255.255.255 via
Serial2 (10.1.1.1)
00:06:34: network 172.16.0.0, metric 1
Introduction to IGRP
IGRP
Source
Destination
–Bandwidth
–Delay
–Reliability
–Loading
–MTU
IGRP Unequal Multiple Paths
New Route
Source
Initial
Route Destination
Router(config-router)#network network-number
Router(config-router)#variance multiplier
• Control IGRP load balancing
Router(config-router)#traffic-share
{ balanced | min }
RouterA#sh ip protocols
Routing Protocol is "igrp 100"
Sending updates every 90 seconds, next due in 21 seconds
Invalid after 270 seconds, hold down 280, flushed after 630
Outgoing update filter list for all interfaces is
Incoming update filter list for all interfaces is
Default networks flagged in outgoing updates
Default networks accepted from incoming updates
IGRP metric weight K1=1, K2=0, K3=1, K4=0, K5=0
IGRP maximum hopcount 100
IGRP maximum metric variance 1
Redistributing: igrp 100
Routing for Networks:
10.0.0.0
172.16.0.0
Routing Information Sources:
Gateway Distance Last Update
10.1.1.2 100 00:01:01
Distance: (default is 100)
Displaying the
IP Routing Table
E0 S2 S2 S3 S3 E0
172.16.1.0 A 192.168.1.0
B C
172.16.1.1 10.1.1.1 10.1.1.2 10.2.2.2 10.2.2.3 192.168.1.1
RouterA#sh ip route
Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP
i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, * - candidate default
U - per-user static route, o - ODR
T - traffic engineered route
172.16.1.0 X A
S2 S2
B
S3 S3
C
E0
192.168.1.0
172.16.1.1 10.1.1.1 10.1.1.2 10.2.2.2 10.2.2.3 192.168.1.1
– EIGRP supports:
• Rapid convergence
• Reduced bandwidth usage
• Multiple network-layer protocols
EIGRP Features
• Incremental updates
• Supports VLSM and discontiguous networks
• Classless routing
• Compatible with existing IGRP networks
• Protocol independent
(supports IPX and AppleTalk)
Advantages of EIGRP
p2r2
A B
A B
2
Here is my complete routing information. Update
3
Initial Route Discovery
A B
2
Here is my complete routing information. Update
5
Initial Route Discovery
A B
2
Here is my complete routing information. Update
4
Topology 3 Thanks for the information!
Ack
Table
5
Initial Route Discovery
A B
2
Here is my complete routing information. Update
4
Topology 3 Thanks for the information!
Ack
Table
5
Update Here is my complete route information.
6
Initial Route Discovery
A B
2
Here is my complete routing information. Update
4
Topology 3 Thanks for the information!
Ack
Table
5
Update Here is my complete route information.
Converged
EIGRP Route Selection
IP IP
A B
AppleTalk 19.2 AppleTalk
T1 T1
IPX IPX
T1
C D
(1)
D EIGRP FD AD Topology
(1) (a) 2 (fd)
B D via B 2 1 (Successor)
via C 5 3
(2)
(2) (1)
E EIGRP FD AD Topology
(1) (a) 3 (fd)
C E via D 3 2 (Successor)
via C 4 3
DUAL Example
(a) C EIGRP FD AD Topology
(a) 3 (fd)
via B 3 1 (Successor)
A via D 4 2 (fs)
via E 4 3
(1)
D EIGRP FD AD Topology
(1) (a) 2 (fd)
B X D via B 2 1 (Successor)
via C 5 3
(2)
(2) (1)
E EIGRP FD AD Topology
(1) (a) 3 (fd)
C E via D 3 2 (Successor)
via C 4 3
DUAL Example (cont.)
(a) C EIGRP FD AD Topology
(a) 3 (fd)
via B 3 1 (Successor)
A via D
via E 4 3
(1)
D EIGRP FD AD Topology
(a) **ACTIVE** -1 (fd)
B D via E (q)
via C 5 3 (q)
(2)
(2) Q (1)
Q
E EIGRP FD AD Topology
(1) (a) 3 (fd)
C E via D 3 2 (Successor)
via C 4 3
DUAL Example (cont.)
(a) C EIGRP FD AD Topology
(a) 3 (fd)
via B 3 1 (Successor)
A via D
via E
(1)
D EIGRP FD AD Topology
(a) **ACTIVE** -1 (fd)
B D via E (q)
via C 5 3
(2) R
(2) (1)
E EIGRP FD AD Topology
(1) (a) **ACTIVE** -1 (fd)
C Q E via D
via C 4 3 (q)
DUAL Example (cont.)
(a) C EIGRP FD AD Topology
(a) 3 (fd)
via B 3 1 (Successor)
A via D
via E
(1)
D EIGRP FD AD Topology
(a) **ACTIVE** -1 (fd)
B D via E (q)
via C 5 3
(2)
(2) (1)
E EIGRP FD AD Topology
(1) (a) 4 (fd)
C R E via C 4 3 (Successor)
via D
DUAL Example (cont.)
(a) C EIGRP FD AD Topology
(a) 3 (fd)
via B 3 1 (Successor)
A via D
via E
(1)
D EIGRP FD AD Topology
(a) 5 (fd)
B D via C 5 3 (Successor)
R via E 5 4 (Successor)
(2)
(2) (1)
E EIGRP FD AD Topology
(1) (a) 4 (fd)
C E via C 4 3 (Successor)
via D
DUAL Example (cont.)
(a) C EIGRP FD AD Topology
(a) 3 (fd)
via B 3 1 (Successor)
A via D
via E
(1)
D EIGRP FD AD Topology
(a) 5 (fd)
B D via C 5 3 (Successor)
via E 5 4 (Successor)
(2)
(2) (1)
E EIGRP FD AD Topology
(1) (a) 4 (fd)
C E via C 4 3 (Successor)
via D
DUAL Example (Start)
(a) C EIGRP FD AD Topology
(a) 3 (fd)
via B 3 1 (Successor)
A via D 4 2 (fs)
via E 4 3
(1)
D EIGRP FD AD Topology
(1) (a) 2 (fd)
B D via B 2 1 (Successor)
via C 5 3
(2)
(2) (1)
E EIGRP FD AD Topology
(1) (a) 3 (fd)
C E via D 3 2 (Successor)
via C 4 3
DUAL Example (End)
(a) C EIGRP FD AD Topology
(a) 3 (fd)
via B 3 1 (Successor)
A via D
via E
(1)
D EIGRP FD AD Topology
(a) 5 (fd)
B D via C 5 3 (Successor)
via E 5 4 (Successor)
(2)
(2) (1)
E EIGRP FD AD Topology
(1) (a) 4 (fd)
C E via C 4 3 (Successor)
via D
EIGRP Load Balancing
20 B 10
10 10
Network Z
E C A
(config)#
variance 2 20 25
172.16.7.0 E
192.168.1.0
T0 S1 172.16.5.0
10.1.0.0 172.16.2.0
A
S0 S2
B 172.16.1.0
D
10.2.0.0 C 172.16.3.0
Token
Ring router eigrp 109
172.16.4.0 network 10.0.0.0
network 172.16.0.0
• Network 192.168.0.0 is not configured on Router
A because it is not directly connected to Router A
EIGRP Summarization—Automatic
• Purpose: Smaller routing tables, smaller updates, query
boundary
• Autosummarization:
– On major network boundaries, subnetworks are summarized to a
single classful (major) network
– Autosummarization is turned on by default
172.16.X.X 172.17.X.X
172.16.0.0/16
EIGRP Summarization—Manual
• Manual summarization
– Configurable on a per-interface basis in any
router within network
– When summarization is configured on an interface,
the router immediate creates a route pointing to null
zero
• Loop prevention mechanism
– When the last specific route of the summary goes
away, the summary is deleted
– The minimum metric of the specific routes is used
as the metric of the summary route
Configuring Summarization
(config-router)#
no auto-summary
router eigrp 1
network 10.0.0.0
network 172.16.0.0
no auto-summary
Verifying EIGRP
Operation
© 2000, Cisco Systems, Inc. www.cisco.com 6-452
Verifying EIGRP Operation
Router#
show ip eigrp neighbors
Router#
– Displays the neighbors discovered by
show ip eigrp topology IP EIGRP
– Displays the IP EIGRP topology table
Router# – Displays current EIGRP entries in the
show ip route eigrp routing table
– Displays the parameters and current
Router# state of the active routing protocol
process
show ip protocols
– Displays the number of IP EIGRP
packets sent and received
Router#
show ip eigrp traffic
Verifying EIGRP Operation
(cont.)
Router#
debug eigrp packet
Token
Ring
FDDI
Token Internet
Ring
FDDI
172.17.0.0
Queue
List
Queue
List
Dial-on-demand routing
– Standard
– Checks Source address
– Generally permits or denies entire protocol suite
What Are Access Lists?
E0 Access List Processes
Outgoing
Source Protocol Packet
Incoming
Packet and Permit?
Destination S0
– Standard
– Checks Source address
– Generally permits or denies entire protocol suite
– Extended
– Checks Source and Destination address
– Generally permits or denies specific protocols
What Are Access Lists?
E0 Access List Processes
Outgoing
Source Protocol Packet
Incoming
Packet and Permit?
Destination S0
– Standard
– Checks Source address
– Generally permits or denies entire protocol suite
– Extended
– Checks Source and Destination address
– Generally permits or denies specific protocols
• Inbound or Outbound
Outbound Access Lists
Packet
Choose S0
Inbound Interface
Y
Interface Outbound
Packets Interfaces
Routing
Table
Entry
?
N Access N
List
?
Y
Notify Sender
Packet Discard Bucket
Deny Permit
Destination
Interface(s)
Packet
Discard Deny
Bucket
A List of Tests: Deny or Permit
Match
First
Packets to Interface(s) Test
in the Access Group Y ? Y
N
Deny Permit
Match
Y Y
Deny Next Permit
Test(s) Destination
?
Interface(s)
Packet
Discard Deny
Bucket
A List of Tests: Deny or Permit
Match
First
Packets to Interface(s) Test
in the Access Group Y ? Y
N
Deny Permit
Match
Y Y
Deny Next Permit
Test(s) Destination
?
N
Interface(s)
Y Match Y
Deny Last Permit
Test
?
Packet
Discard Deny
Bucket
A List of Tests: Deny or Permit
Match
First
Packets to Interface(s) Test
in the Access Group Y ? Y
N
Deny Permit
Match
Y Y
Deny Next Permit
Test(s) Destination
?
N
Interface(s)
Y Match Y
Deny Last Permit
Test
?
N Implicit
Deny
Packet
Discard If no match
Deny
Bucket deny all
Access List Configuration
Guidelines
– Access list numbers indicate which protocol is filtered
– One access list per interface, per protocol, per direction
– The order of access list statements controls testing
– Most restrictive statements should be at the top of list
– There is an implicit deny any as the last access list test—
every list should have at least one permit statement
– Create access lists before applying them to interfaces
– Access list, filter traffic going through the router; they do not
apply to traffic originated from the router
Access List Command Overview
Step 1: Set parameters for this access list test
statement (which can be one of several statements)
Router(config)#
access-list access-list-number { permit | deny } { test conditions }
Access List Command Overview
Step 1: Set parameters for this access list test
statement (which can be one of several statements)
Router(config)#
access-list access-list-number { permit | deny } { test conditions }
IP Standard 1-99
IP Standard 1-99
Extended 100-199
IP Standard 1-99
Extended 100-199
Named Name (Cisco IOS 11.2 and later)
Source
Address Use
access
list statements
1-99
Deny Permit
Testing Packets with
Extended Access Lists
• An Example from a TCP/IP Packet
Frame
Header Packet Segment
(IP header) (for example, Data
(for example,
HDLC) TCP header)
Port
Number
Protocol
Source Use
Address access
Destination list statements
Address 1-99 or 100-199 to
test the
Deny packet Permit
Wildcard Bits: How to Check the
Corresponding Address Bits
Octet bit position and
128 64 32 16 8 4 2 1 address value for bit
Examples
check all address bits
0 0 0 0 0 0 0 0 = (match all)
0 0 0 1 0 0 0 0
Wildcard mask: 0 0 0 0 1 1 1 1
|<---- match ---->|<----- don’t care ----->|
0 0 0 1 0 0 0 0 = 16
0 0 0 1 0 0 0 1 = 17
0 0 0 1 0 0 1 0 = 18
: :
0 0 0 1 1 1 1 1 = 31
Configuring Standard
IP Access Lists
Router(config-if)#
ip access-group access-list-number { in | out }
S0
172.16.4.13
E0 E1
S0
172.16.4.13
E0 E1
interface ethernet 0
ip access-group 1 out
interface ethernet 1
ip access-group 1 out
S0
172.16.4.13
E0 E1
S0
172.16.4.13
E0 E1
S0
172.16.4.13
E0 E1
interface ethernet 0
ip access-group 1 out
S0
172.16.4.13
E0 E1
S0
172.16.4.13
E0 E1
interface ethernet 0
ip access-group 1 out
Router(config-line)#
Standard Extended
S0
172.16.4.13
E0 E1
S0
172.16.4.13
E0 E1
S0
172.16.4.13
E0 E1
interface ethernet 0
ip access-group 101 out
S0
172.16.4.13
E0 E1
S0
172.16.4.13
E0 E1
S0
172.16.4.13
E0 E1
To0 Token D E0
Ring
E1
Recommended:
– Place extended access lists close to the source
– Place standard access lists close to the destination
Verifying Access Lists
wg_ro_a#show ip int e0
Ethernet0 is up, line protocol is up
Internet address is 10.1.1.11/24
Broadcast address is 255.255.255.255
Address determined by setup command
MTU is 1500 bytes
Helper address is not set
Directed broadcast forwarding is disabled
Outgoing access list is not set
Inbound access list is 1
Proxy ARP is enabled
Security level is default
Split horizon is enabled
ICMP redirects are always sent
ICMP unreachables are always sent
ICMP mask replies are never sent
IP fast switching is enabled
IP fast switching on the same interface is disabled
IP Feature Fast switching turbo vector
IP multicast fast switching is enabled
IP multicast distributed fast switching is disabled
<text ommitted>
Monitoring Access List
Statements
wg_ro_a#show {protocol} access-list {access-list number}
wg_ro_a#show access-lists
Standard IP access list 1
permit 10.2.2.1
permit 10.3.3.1
permit 10.4.4.1
permit 10.5.5.1
Extended IP access list 101
permit tcp host 10.22.22.1 any eq telnet
permit tcp host 10.33.33.1 any eq ftp
permit tcp host 10.44.44.1 any eq ftp-data
SILICON COMNET PVT `.LTD.
WAN PROTOCOLS
Typical WAN Encapsulation
Protocols: Layer 2
HDLC, PPP, SLIP
Leased Line
Packet-switched Service
Provider
HDLC
Flag Address Control Data FCS Flag
Router(config-if)#encapsulation hdlc
“santacruz, boardwalk”
Accept/Reject
Response
Hostname: santacruz
Accept/Reject username santacruz
Password: boardwalk password boardwalk
ppp encapsulation
ppp encapsulation
Enabling PPP Authentication Enabling PPP Authentication
hostname hostname
username / password username / password
ppp authentication ppp authentication
Configuring PPP
Router(config-if)#encapsulation ppp
Enable PPP encapsulation
Configuring PPP Authentication
Router(config)#hostname name
Router(config-if)#ppp authentication
{chap | chap pap | pap chap | pap}
Left Right
PSTN/ISDN
router router
CSU/DSU
Presentation
Session
Transport
Network IP/IPX/AppleTalk, etc.
Data Link Frame Relay
EIA/TIA-232,
Physical EIA/TIA-449, V.35,
X.21, EIA/TIA-530
Frame Relay Terminology
PVC
DLCI: 100
DLCI: 200
LMI
100=Active
400=Active
DLCI: 400
Local Access
Local Loop=64 kbps
Access
Loop=T1
PVC
Local Access
Loop=64 kbps
DLCI: 500
Frame Relay
Address Mapping
DLCI: 500 PVC 10.1.1.1
CSU/DSU
Inverse ARP or
Frame Relay map
Frame IP
Relay DLCI (500) (10.1.1.1)
Keepalive
172.168.5.5 172.168.5.7
Frame Relay Inverse ARP and
LMI Operation
1
Frame Relay
DLCI=100 Cloud DLCI=400
172.168.5.5 172.168.5.7
172.168.5.5 172.168.5.7
172.168.5.5 172.168.5.7
172.168.5.5 172.168.5.7
Frame Relay Map
5
172.168.5.5 DLCI 400 Active
172.168.5.5 172.168.5.7
Frame Relay Map
5
172.168.5.5 DLCI 400 Active
Hello, I am 172.168.5.7.
4
Frame Relay Map
5
172.168.5.7 DLCI 100 Active
172.168.5.5 172.168.5.7
Frame Relay Map
5
172.168.5.5 DLCI 400 Active
Hello, I am 172.168.5.7.
4
Frame Relay Map
5
172.168.5.7 DLCI 100 Active
Hello, I am 172.168.5.5.
6
Keepalives Keepalives
7 7
Configuring Basic Frame Relay
Rel. 11.2 Router Rel. 10.3 Router
HQ Branch
HQ Branch
Inverse ARP
• Enabled by default
• Does not appear in configuration output
Configuring a Static Frame
Relay Map
DLCI=110
IP address=10.16.0.1/24
p1r1
HQ Branch
DLCI=100
IP address=10.16.0.2/24
interface Serial1
ip address 10.16.0.1 255.255.255.0
encapsulation frame-relay
bandwidth 64
frame-relay map ip 10.16.0.2 110 broadcast
Verifying Frame Relay
Operation
Router#show interface s0
Serial0 is up, line protocol is up
Hardware is HD64570
Internet address is 10.140.1.2/24
MTU 1500 bytes, BW 1544 Kbit, DLY 20000 usec, rely 255/255, load 1/255
Encapsulation FRAME-RELAY, loopback not set, keepalive set (10 sec)
LMI enq sent 19, LMI stat recvd 20, LMI upd recvd 0, DTE LMI up
LMI enq recvd 0, LMI stat sent 0, LMI upd sent 0
LMI DLCI 1023 LMI type is CISCO frame relay DTE
FR SVC disabled, LAPF state down
Broadcast queue 0/64, broadcasts sent/dropped 8/0, interface broadcasts 5
Last input 00:00:02, output 00:00:02, output hang never
Last clearing of "show interface" counters never
Queueing strategy: fifo
Output queue 0/40, 0 drops; input queue 0/75, 0 drops
<Output omitted>
LMI Statistics for interface Serial0 (Frame Relay DTE) LMI TYPE = CISCO
Invalid Unnumbered info 0 Invalid Prot Disc 0
Invalid dummy Call Ref 0 Invalid Msg Type 0
Invalid Status Message 0 Invalid Lock Shift 0
Invalid Information ID 0 Invalid Report IE Len 0
Invalid Report Request 0 Invalid Keep IE Len 0
Num Status Enq. Sent 113100 Num Status msgs Rcvd 113100
Num Update Status Rcvd 0 Num Status Timeouts 0
DLCI = 100, DLCI USAGE = LOCAL, PVC STATUS = ACTIVE, INTERFACE = Serial0
Full Mesh
Partial Mesh
2
AA C
C
3
D
•Problem:
Broadcast traffic must be replicated for
each active connection
Resolving Reachability Issues
Logical Interface Physical
Interface Subnet A
S0.1 S0
S0.2 Subnet B
S0.3
Subnet C
• Solution:
– Split horizon can cause problems in NBMA environments
– Subinterfaces can resolve split horizon issues
– A single physical interface simulates multiple logical interfaces
Configuring Subinterfaces
– Point-to-Point
– Subinterfaces act as leased line
– Each point-to-point subinterface requires its own subnet
– Applicable to hub and spoke topologies
• Multipoint
– Subinterfaces act as NBMA network so they do not resolve the split
horizon issue
– Can save address space because uses single subnet
– Applicable to partial-mesh and full-mesh topology
Configuring Point-to-Point
Subinterfaces
10.17.0.1
s0.2 DLCI=110 10.17.0.2
A
s0.3
10.18.0.1 B
interface Serial0
no ip address
encapsulation frame-relay
!
10.18.0.2
interface Serial0.2 point-to-point
ip address 10.17.0.1 255.255.255.0
bandwidth 64 C
frame-relay interface-dlci 110
!
interface Serial0.3 point-to-point
ip address 10.18.0.1 255.255.255.0
bandwidth 64
frame-relay interface-dlci 120
!
Multipoint Subinterfaces
Configuration Example
B
s2.2=10.17.0.1/24 s2.1=10.17.0.2/24
DLCI=130
RTR1
RTR3
s2.1=10.17.0.3/24
interface Serial2
no ip address RTR4
encapsulation frame-relay s2.1=10.17.0.4/24
!
interface Serial2.2 multipoint
ip address 10.17.0.1 255.255.255.0
bandwidth 64
frame-relay map ip 10.17.0.2 120
broadcast
frame-relay map ip 10.17.0.3 130
broadcast
frame-relay map ip 10.17.0.4 140
broadcast
© 2002, Cisco Systems, Inc. All rights reserved.
OSPF Overview
Frame Payload
C
Frame
IP Protocol R
Header Packet Payload
Header Number C
Interfaces
Token
Ring
OSPF Terminology
Neighbors
Interfaces
Token
Ring
OSPF Terminology
Neighbors
Interfaces
Cost = 10
Token
Ring
Cost = 1785 Cost = 6
OSPF Terminology
Neighbors
Interfaces
Area 1 Cost = 10
Area 0
Token
Ring
Cost = 1785 Cost = 6
OSPF Terminology
Autonomous System
Neighbors
Interfaces
Area 1 Cost = 10
Area 0
Token
Ring
Cost = 1785 Cost = 6
OSPF Terminology
Autonomous System
Neighbors
Interfaces
Area 1 Cost = 10
Area 0
Token
Ring
Cost = 1785 Cost = 6
Neighborship
Database
Lists Neighbors
OSPF Terminology
Autonomous System
Neighbors
Interfaces
Area 1 Cost = 10
Area 0
Token
Ring
Cost = 1785 Cost = 6
Neighborship Topology
Database Database
Lists Neighbors Lists All Routes
OSPF Terminology
Autonomous System
Neighbors
Interfaces
Area 1 Cost = 10
Area 0
Token
Ring
Cost = 1785 Cost = 6
Broadcast
Multiaccess
Point-to-Point
NBMA X.25
Frame Relay
OSPF Operation in a
Broadcast Multiaccess
Topology
Hello
B A C
Router ID
afadjfjorqpoeru
39547439070713 Neighbors
*
Hello/dead intervals
Area-ID*
Router priority
Hello DR IP address
BDR IP address
Authentication password *
*
Stub area flag
Hello
B A C
Router ID
afadjfjorqpoeru
39547439070713 Neighbors
*
Hello/dead intervals
Area-ID*
Router priority
Hello DR IP address
BDR IP address
Authentication password *
*
Stub area flag
DR BDR
DR BDR
Hello
Init State
Router B
Neighbors List
172.16.5.1/24, int E1
Exchange Process
172.16.5.1/24 172.16.5.2/24
A E0 E1 B
Down State
I am router ID 172.16.5.1 and I see no one.
Init State
Router B
Neighbors List
172.16.5.1/24, int E1
I am router ID 172.16.5.2, and I see 172.16.5.1.
Exchange Process
172.16.5.1/24 172.16.5.2/24
A E0 E1 B
Down State
I am router ID 172.16.5.1 and I see no one.
Init State
Router B
Neighbors List
172.16.5.1/24, int E1
I am router ID 172.16.5.2, and I see 172.16.5.1.
Router A
Neighbors List
172.16.5.2/24, int E0
Two-Way State
Discovering Routes
DR
E0 E0
172.16.5.1 172.16.5.3
afadjfjorqpoeru
Exstart State
39547439070713
afadjfjorqpoeru
39547439070713
afadjfjorqpoeru
39547439070713
afadjfjorqpoeru
39547439070713
Loading State
afadjfjorqpoeru
39547439070713
Loading State
Cost=10
10.4.4.0/24
Topology Table
Net Cost Out Interface
10.2.2.0 6 To0
10.3.3.0 7 To0 This is the best route to 10.3.3.0.
10.3.3.0 10 E0
Maintaining Routing Information
Link-State Change
DR
1 LSU
x A
B
1 LSU
x A
B
1 LSU
3
x A
B
LSU
4 I need to update
my routing table.
1 LSU
3
x A
B
LSU
No
Add to database
Send LSAck
to DR
Flood LSA
End
Maintaining Routing Information
(cont.)
LSU
Is entry in Is seq. #
LSA link-state Ignore LSA
database? the same?
Yes Yes
No
Add to database
Send LSAck
to DR
Flood LSA
End
Maintaining Routing Information
(cont.)
LSU
Is entry in Is seq. #
LSA link-state Ignore LSA
database? the same?
Yes Yes
No
No
Add to database
Is seq. #
higher?
Send LSAck
to DR No
End End
Maintaining Routing Information
(cont.)
LSU
Is entry in Is seq. #
LSA link-state Ignore LSA
database? the same?
Yes Yes
No
No
A Add to database Go
Is seq. #
to
higher? Yes A
Send LSAck
to DR No
End End
OSPF Operation in a
Point-to-Point Topology
router ospf 1
ip address 10.2.1.2 255.255.255.0
<Output Omitted>
network 10.0.0.0 0.255.255.255 area 0
router ospf 50
network 10.2.1.2 0.0.0.0 area 0
network 10.64.0.2 0.0.0.0 area 0
Network
172.16.0.0
•Router ID:
– Number by which the router is known to OSPF
– Default: The highest IP address on an active interface at the
moment of OSPF process startup
– Can be overridden by a loopback interface: Highest IP address of
any active loopback interface
Configuring Optional
Commands (cont.)
Traffic
Token
Ring
Cisco Non-Cisco
Router(config-if)#
ip ospf cost cost
show ip route
show ip ospf
• Displays
Router# OSPF timers and statistics
show ip ospf neighbor detail
clear ip route *
Router#
Inside
10.1.1.1 Internet
10.1.1.2
Inside Local Inside Global
NAT table IP Address IP Address
10.1.1.1 192.168.2.2
10.1.1.2 192.168.2.3
Addresses used in NAT
• STATIC NAT
• DYNAMIC NAT
• DYNAMIC NAT WITH OVERLOAD (PAT-
Port Address Translation)
Translating Inside Local
Addresses
Inside
(Static NAT)
4
DA
192.168.2.2
10.1.1.3 5 3 Host B
DA SA
172.20.7.3
10.1.1.1 192.168.2.2
10.1.1.2 Internet
10.1.1.2
SA
10.1.1.1 1 2 NAT table
Inside Local Inside Global
10.1.1.1 IP Address IP Address
10.1.1.3 192.168.2.4
10.1.1.2 192.168.2.3
10.1.1.1 192.168.2.2
Overloading Inside Global
Inside
Addresses (PAT)
4
DA
192.168.2.2
Host B
10.1.1.3 5 3 172.20.7.3
DA
10.1.1.1
SA
192.168.2.2
4
Internet DA
192.168.2.2
Host C
10.1.1.2 172.21.7.3
1 2 NAT table
SA
10.1.1.1
Protocol Inside Local IP Inside Global IP Outside Global
Address Address: Port IP Address: Port
10.1.1.1 TCP 10.1.1.3 192.168.2.2:1492 172.21.7.3:23
TCP 10.1.1.2 192.168.2.2:1723 172.21.7.3:23
TCP 10.1.1.1 192.168.2.2:1024 172.20.7.3:23
Static NAT Configuration
Example
ip nat inside source static 10.1.1.1 192.168.2.2
!
interface Ethernet0 This interface
ip address 10.1.1.10 255.255.255.0 connected to
ip nat inside the inside
! network.
interface Serial0
This
ip address 172.16.2.1 255.255.255.0 interface
ip nat outside connected to
! the outside
world.
Small office
Digital
PBX
Provider Telecommuter
network
Home office
Central site
NT1
BRI
Service
D 2B provider
network
PRI CSU/DSU
D 23 or 30B
ISDN
1 service provider 3
4
ISDN ISDN
Switch Switch
2 SS7
B channel(s)
D channel/SS7 signaling
ISDN Functions and
Reference Points
Local
loop
TE1 S NT2 T NT1 Service
U provider
network
ISDN Terminal
TE2 R TA
• Functions are devices or
Terminal
Existing Adapter hardware
Terminal • Reference points are
demarcations or interfaces
Cisco ISDN BRI Interfaces
Native ISDN interface—int bri 0
Service
provider
bri 0 network
TE1 NT1
S/T
bri 0
R S/T
TE1 U TE2 TA NT1
S0
NT1 Nonnative ISDN interface—int serial 0
(EIA/TIA-232, V.35, X.21)
ISDN Switch Types
S S S S
S S S S S
CO S S S S CO
PSTN
Chicago
ISDN
I need to send
data to Dallas.
Telecommuter
Headquarters
Vendor
• Periodic connections
• Small amounts of data
Generic DDR Operation
“Interesting”
packet arrives
DCE
DCE
DCE ISDN or
Basic
Service
DCE ISDN or
Basic
Service
DCE
DCE
DCE ISDN or
Basic
Service
Specify address of
next hop router
ip route 10.10.0.0 255.255.0.0 10.1.0.2
ip route 10.20.0.0 255.255.0.0 10.1.0.2
Network prefix
and prefix mask
Task 2: Specifying Interesting Traffic
(What Enables the Connection?)
• Without Access Lists
dialer-list 1 protocol ip permit
Any IP traffic, except FTP and Telnet, will initiate the link
Task 3: Configuring the
Dialer Information
hostname Home
! • Applies rules
isdn switch-type basic-5ess
! defined by dialer-
interface BRI0
ip address 10.1.0.1 255.255.255.0
encapsulation ppp
list to individual
dialer idle-timeout 180
dialer map ip 10.1.0.2 name Central 5552000
interfaces
dialer-group 1
no fair-queue
ppp authentication chap
!
router rip
network 10.0.0.0 Both values
!
no ip classless must match
ip route 10.10.0.0 255.255.0.0 10.1.0.2
ip route 10.20.0.0 255.255.0.0 10.1.0.2
!
dialer-list 1 protocol ip permit
Task 3: Configuring the
Dialer Information (cont.)
How do I get to
subnetwork 10.10.0.0?
interface BRI0
ip address 10.1.0.1 255.255.255.0
encapsulation ppp
Number to dial
dialer idle-timeout 180
dialer map ip 10.1.0.2 name Central 5552000
dialer-group 1 Remote host name
no fair-queue Used for PPP CHAP
ppp authentication chap
Legacy DDR Configuration
Tasks Summarized
hostname Home
!
isdn switch-type basic-5ess
!
interface BRI0
ip address 10.1.0.1 255.255.255.0
encapsulation ppp
dialer idle-timeout 180
dialer map ip 10.1.0.2 name Central 5552000
3 dialer-group 1
no fair-queue
ppp authentication chap
!
router rip
network 10.0.0.0
!
no ip classless
ip route 10.10.0.0 255.255.0.0 10.1.0.2
1 ip route 10.20.0.0 255.255.0.0 10.1.0.2
2 dialer-list 1 protocol ip permit
!
Optional Legacy DDR
Commands
Router(config-if)#dialer load-threshold load
[ outbound | inbound | either ]
Router#show dialer
• Displays current status of link, including
amount of time link is connected
• Ethernet concentrator
One device sending at a time • “Self-contained” Ethernet
LAN in a box
• Works at physical layer 1
Collisions: Telltale Signs
One device
sending at
a time
All nodes share 10 Mbps
Ethernet
Backbone Switched Ethernet 10
Switch
Multiple
devices
sending at the
same time
Each node has 10 Mbps
Today’s LANs
• Mostly switched
resources; few
10-Mbps
10/100
Switch Hub shared
• Routers provide
scalability
10/100
Switch
• Groups of users
determined by
physical location
LAN Switching Basics
– Wire speed
• Layer 2 switch is considered faster because no
modification in the packet.
– Low Latency
• Because the switching is faster
– Low cost
LAN Switching Basics
• Enables dedicated
access
• Eliminates collisions
and increases
capacity
• Supports multiple
conversations at the
same time
Functions of Switch
at Layer 2
– Address Learning
– Loop Avoidance
Address Learning
• Switches and Bridges remember the source address of each frame
received on an interface and enter this information into MAC
database.
– Whenever switch receives a packet it makes an entry of the
source address and sends a broadcast for destination.
- The destination machine then responds to broadcast and switch
receives a packet from destination.
– Switch again makes entry for the destination machine’s
hardware address.
– Using this method Switch maintains a table stating that which
hardware address is available at which port.
Forward / Filter Decisions
Data from A to B
– Forwards based on the MAC
(Layer 2) address
• Operates at OSI Layer 2 A C
2
• Learns a station’s location 3 1
by examining source Data from
10AMbps
to B
address
Data from A to B
4
– Sends out all ports when
B
destination address is
broadcast, or unknown address Interface
– Forwards when destination is 1 2 3 4
Stations
Data from B to A
– Sends out all ports when
B
destination address is
broadcast,or unknown address Interface
– Forwards when destination is 1 2 3 4
Stations
– Cut-through
– FragmentFree
Store and Forward
Station A
Segment A
1/1 2/1
Switch 1 Switch 2
1/2 2/2 Segment B
Station B
How does Loop occur
Loop Occuring
• In this scenario if no loop avoidance scheme is implemented
the switch will generate a broadcast storm.
• A device can receive multiple copy of same frames.
• The MAC address table will be continuously updated and the
table itself will be confused, because frames will be received
from more than one link. This is called “thrashing” MAC Table.
• This is how loops within other loop will be generated and no
switching will be performed in the network.
Note : Spanning Tree Protocol is designed to solve this
problem.
Spanning-Tree Protocol
• The main function of STP is to maintain a loop free
network.
Floor 3
Floor 2
Floor 1
VLAN 2
• Application type driven VLAN 3
VLAN 1 VLAN 2
MAC MAC
Addresses Addresses
VLAN 1 VLAN 2
Membership by Port
Maximizes Forwarding Performance
VLAN 3
SRC DES
Data
VLAN ID
Company ABC
Types of Links in Switched
environment
Access Links :
• These are part of only one VLAN and are known
as Native VLAN of the port.
• Device attached to these link are unaware of
VLAN membership.
• VLAN information from the frame are remove
before it is set to an access link device.
• Access link devices are not capable of
communicating to device outside the VLAN
unless the packet is routed thru a router.
Trunk Links :
• Capable of carrying multiple VLANs
• Used to connect Switches to other
Switches or to Routers or even Servers
• Supported on Fast or Gigabit ether net
only.
VLAN identification modes
• TO identify which frames belongs to
which VLAN, VLAN identification is
used.The multiple types of trunking
methods are:
Inter-Switch Link (ISL)
• Proprietary to Cisco Switches
• Used for Fast Ethernet and Gigabit
ethernet links only
• Used on a Switch port, Router interfaces
and Server Interface Cards to trunk a
server.
IEEE 802.1q
• Created by IEEE as standard method for Frame
Tagging.
• It inserts a field into Frame to identify the VLAN.
• When trunking between Cisco Switches link and
different brand of Switch, it is mandatory to use
802.1q for the trunk to work.
Inter-Switch Link (ISL) Protocol
• ISL is an external tagging process, which
means the original frame is not altered but
encapsulated with a new 26 byte ISL
header.
• It also adds a second 4 byte FCS field at
the end of the frame.
DrawBack
• As the frame is encapsulated with information,
only ISL devices can read it.
• Also, the frame can be up to 1522 bytes long,
devices that receive an ISL frame may record
this as giant frame, as it is over the maximum of
1518 bytes allowed on an ethernet segment.
TRUNKING
• Trunk Links are 100-1000 Mbps point-to-point
links between two Switches, between a Switch
and Router or between Switch and Server.
• Trunk Links carry the traffic of multiple VLANs,
from 1 to 1005 at a time
• Cannot run Trunk Links on 10 Mbps.
Virtual Trunk Protocol (VTP)
• VLAN administration and configuration protocol
– Reduces VLAN setup and administration
VLAN 1
– Eliminates configuration errors
– Decreases network manager’s
time adding and managing VLAN 2
VLANs
ISL ISL
– Maps VLANs across different backbones
(FDDI, Fast Ethernet, ATM)
– Maps between ISL and 802.1q
LANE LANE
– Maintains security between VLANs
ATM
Fabric
LANE
802.1Q
VLAN Trunking Protocol
(VTP)
Global configuration
Example
This example shows how to configure VLAN 2 with the name
Engineering:
hostname(config)# vlan 2 name engineering
show (vlan)
Use the show vlan privileged Exec command to display the settings of VLAN
configuration parameters.
show vlan [vlan]
Syntax Description
vlan Number from 1 to 1005.
Default
This command has no default value.
Command Mode
Privileged Exec
Usage Guidelines
If you do not specify vlan, the system displays all VLAN configuration parameters.
Example
This example shows how to display the settings of the VLAN configuration parameters:
hostname# show vlan
VLAN Name Status Ports
---- -------------------------------- ---------
1 default active 1-15
2 VLAN0002 active 16-18
3 VLAN0003 active
4 VLAN0004 active
5 VLAN0005 active
Vlan-membership
vlan-membership
Use the vlan-membership interface configuration command to assign a port to
a VLAN. Use the no vlan-membership command to remove a port from a
VLAN.
vlan-membership {static {vlan} | dynamic}
no vlan-membership
Syntax Description
Example
Syntax Description
This command has no additional arguments or keywords.
Default
This command has no default value.
Command Mode
Privileged Exec
Usage Guidelines
This command is not functional when bridge groups are enabled.
Example
This example shows how to display the VLAN assignment and
membership type for all switch ports:
hostname# show vlan-membership
VTP
Default
The default VTP mode is server, and the default trap-generation is
enabled. The default VTP pruning mode is enabled.
Usage Guidelines
If you create a VTP password, it generates a secret value. This value is
used in the calculation of the MD5 digest of a VTP advertisement. The
MD5 digest ensures the validity of VTP advertisements.
show (vtp)
Use the show vtp privileged Exec command to display Vlan Trunking Protocol
(VTP) statistics.
Syntax Description
This command has no additional arguments or keywords.
Default
This command has no default value.
Command Mode
Privileged Exec
Usage Guidelines
Example
This example shows how to display VTP statistics:
hostname# show vtp
VTP version: 1
Configuration revision : 3
Maximum VLANs supported locally: 1005
Number of existing VLANs: 5
VTP domain name : Zorro
VTP password : vtp_server
VTP operating mode : Server
VTP pruning mode : Enabled
VTP traps generation : Enabled
Configuration last modified by: 0.0.0.0 at
00-00-0000 00:00:00
Trunk
auto Enables a port to become a trunk only if the connected device has
the state set to On or Desirable.
nonegotiate Configures port to permanent ISL trunk mode and no
negotiation takes place with the partner.
Trunk
Default
The default DISL configuration state for a Fast Ethernet port is
off.
Command Mode
Interface configuration
Usage Guidelines
This command applies only to one Fast Ethernet port. If you use
this command for a Fast Ethernet port that is an aggregate port
group member, the newly configured value also applies to all
other aggregate port group members.
Trunk
Example
This example shows how to set the Fast Ethernet port to trunk
mode:
hostname(config)# interface fastethernet
0/26
hostname(config-if)# trunk on
© 2002, Cisco Systems, Inc. All rights reserved.