Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB ....

162
COMSATS INTITUTE OF INFORMATION TECHNOLOGY Computer Communication & Computer Networks Laboratory Manual

Transcript of Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB ....

Page 1: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

COMSATS INTITUTE OF INFORMATION TECHNOLOGY

Computer Communication

&

Computer Networks

Laboratory Manual

Table of contents

Page 2: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

LAB Number

LAB NAME Page Numbe

r

Page 3: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

Lab1 Introduction to Lab EquipmentLab 2 Cables and Connection

Lab 3,4 NS 2 installationLab 5,6 NS2 IntroductionLab 7 NS2 example 1 with two nodes Lab 8 Example 2 with 4 nodesLab 9 The Command Line Interface

Lab 10 Configuring a Single Cisco RouterLab 11 Configuring static route Lab 12 Configuring RIPLab 13 Configuring Enhanced Interior Gateway Routing Protocol

(EIGRP)Lab 14 Single Area OSPFLab 15 Configuring a SwitchLab 16 Virtual LANLab 17 VLAN Trunking Protocol and Inter VLAN

RoutingLab 18 STP and EtherChannelLab 19 Creating a Network Map using CDPLab 20 Basic Troubleshooting Lab 21 Basic Troubleshooting(cont..)Lab 22 (WANs)Configuring HDLC Encapsulation on a Serial LineLab 23 Configuring PPP on a Serial Line (Mandatory Commands)Lab 24 Configuring Frame RelayLab 25 Implementing a WLANLab 26 Configuration of DHCPLab 27 (WANs)Configuring HDLC Encapsulation on a Serial Line

Lab 28-30 Final Project Ideas and Discussion

1. Introduction to Lab Equipment

Page 4: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

All networks are made up of basic hardware building blocks to interconnect network nodes, such as Network Interface Cards (NICs), Bridges, Hubs, Switches, and Routers. In addition, some method of connecting these building blocks is required, usually in the form of galvanic cable (most commonly Category 5 cable). Less common are microwave links (as in IEEE 802.12) or optical cable ("optical fiber"). An ethernet card may also be required.

Network interface cards

A network card, network adapter or NIC (network interface card) is a piece of computer hardware designed to allow computers to communicate over a computer network. It provides physical access to a networking medium and often provides a low-level addressing system through the use of MAC addresses. It allows users to connect to each other either by using cables or wirelessly.The NIC provides the transfer of data in megabytes

.

Repeaters

A repeater is an electronic device that receives a signal and retransmits it at a higher power level, or to the other side of an obstruction, so that the signal can cover longer distances without degradation. In most twisted pair ethernet configurations, repeaters are required for cable runs longer than 100 meters away from the computer.

Hubs

A hub contains multiple ports. When a packet arrives at one port, it is copied to all the ports of the hub for transmission. When the packets are copied, the destination address in the frame does not change to a broadcast address. It does this in a rudimentary way: It simply copies the data to all of the Nodes connected to the hub.

Page 5: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

Bridges

A network bridge connects multiple network segments at the data link layer (layer 2) of the OSI model. Bridges do not promiscuously copy traffic to all ports, as hubs do, but learn which MAC addresses are reachable through specific ports. Once the bridge associates a port and an address, it will send traffic for that address only to that port. Bridges do send broadcasts to all ports except the one on which the broadcast was received.

Bridges learn the association of ports and addresses by examining the source address of frames that it sees on various ports. Once a frame arrives through a port, its source address is stored and the bridge assumes that MAC address is associated with that port. The first time that a previously unknown destination address is seen, the bridge will forward the frame to all ports other than the one on which the frame arrived.

Bridges come in three basic types:

1. Local bridges: Directly connect local area networks (LANs) 2. Remote bridges: Can be used to create a wide area network (WAN) link

between LANs. Remote bridges, where the connecting link is slower than the end networks, largely have been replaced by routers.

3. Wireless bridges: Can be used to join LANs or connect remote stations to LANs.

Page 6: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

Switches

A switch is a device that forwards and filters OSI layer 2 datagrams (chunk of data communication) between ports (connected cables) based on the MAC addresses in the packets. This is distinct from a hub in that it only forwards the datagrams to the ports involved in the communications rather than all ports connected. Strictly speaking, a switch is not capable of routing traffic based on IP address (layer 3) which is necessary for communicating between network segments or within a large or complex LAN. Some switches are capable of routing based on IP addresses but are still called switches as a marketing term. A switch normally has numerous ports, with the intention being that most or all of the network is connected directly to the switch, or another switch that is in turn connected to a switch.

Switch is a marketing term that encompasses routers and bridges, as well as devices that may distribute traffic on load or by application content (e.g., a Web URL identifier). Switches may operate at one or more OSI model layers, including physical, data link, network, or transport (i.e., end-to-end). A device that operates simultaneously at more than one of these layers is called a multilayer switch.

Overemphasizing the ill-defined term "switch" often leads to confusion when first trying to understand networking. Many experienced network designers and operators recommend starting with the logic of devices dealing with only one protocol level, not all of which are covered by OSI. Multilayer device selection is an advanced topic that may lead to selecting particular implementations, but multilayer switching is simply not a real-world design concept.

Page 7: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

Routers

Routers are networking devices that forward data packets between networks using headers and forwarding tables to determine the best path to forward the packets. Routers work at the network layer of the TCP/IP model or layer 3 of the OSI model. Routers also provide interconnectivity between like and unlike media. This is accomplished by examining the Header of a data packet, and making a decision on the next hop to which it should be sent They use preconfigured static routes, status of their hardware interfaces, and routing protocols to select the best route between any two subnets. A router is connected to at least two networks, commonly two LANs or WANs or a LAN and its ISP's network. Some DSL and cable modems, for home (and even office) use, have been integrated with routers to allow multiple home/office computers to access the Internet through the same connection. Many of these new devices also consist of wireless access points (waps) or wireless routers to allow for IEEE 802.11g/b/n wireless enabled devices to connect to the network without the need for cabled connections.

Page 8: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

2. Cables and ConnectionThis chapter provides information and commands concerning the following topics:• Connecting a rollover cable to your router or switch• Determining what your terminal settings should be• Understanding the setup of different LAN connections• Identifying different serial cable types• Determining which cable to use to connect your router or switch to another device• Crossover Ethernet Cable Pinouts

Connecting a Rollover Cable to Your Router or Switch Figure 2-1 shows how to connect a rollover cable from your PC to a router or switch.Figure 2-4 Rollover Cable Connections

Terminal Settings

Figure 2-2 illustrates the settings that you should configure to have your PC connect to a router or switch.Figure 2-5 PC Settings to Connect to a Router or Switch

Page 9: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

LAN Connections

Table 2-1 shows the various port types and connections between LAN devices.Table 2-1 LAN Connections

Serial Cable Types

Figure 2-3 shows the DB-60 end of a serial cable that connects to a 2500 series router.Figure 2-4 shows the newer smart serial end of a serial cable that connects to a smart serial port on your router. Smart serial ports are found on modular routers,

Page 10: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

such as the ISR (x800) series, or on older modular routers such as the 1700 or 2600 series.Figure 2-5 shows examples of the male DTE and the female DCE ends that are on the other side of a serial or smart serial cable.Most laptops available today come equipped with USB ports, not serial ports. For these laptops, you need a USB-to-serial connector, as shown in Figure 4-6.

Page 11: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

NOTE: CCNA focuses on V.35 cables for back-to-back connections between routers.

USB-to-Serial Connector for Laptops

Which Cable to Use?Table 2-2 describes which cable should be used when wiring your devices together. It is important to ensure you have proper cabling; otherwise, you might be giving yourself problems before you even get started.Table 2-2 Determining Which Cables to Use When Wiring Devices Together

Table 2.3lists the pinouts for straight-through, crossover, and rollover cables.

Table 2.3Pinouts for Different Cables

Page 12: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

Crossover Ethernet Cable Pinouts:

Standard Ethernet Cable Pinouts:

Page 13: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

4. NS2 installation:

Procedure 1:

How to Install NS-2 on Windows using VMware

Steps:

1. Install Vmware-http://www.filesonic.com/file/36283655/Vmware.Workstation.7.1.3.rar

2. Install fedora or any other Linux flavor on VMware3. Install NS-2.34 on

Linux-http://sourceforge.net/projects/nsnam/files/allinone/ns-allinone-2.34/ 4. Type ./install on terminal to compile the source after extracting NS-25. Type gedit ~/.bashrc on terminal to set the environment variables.Append

the following text to opened file (Please note that the path contains the path in my system, replace "usman" in the path with your username) 

6. # .bashrc7. export PATH=$PATH:/home/usman/ns-allinone-2.34/bin:/home/usman/ns-

allinone-2.34/tcl8.4.18/unix:/home/usman/ns-allinone-2.34/tk8.4.18/unix8. export LD_LIBRARY_PATH=$LD_LIBRARY_PATH:/home/usman/ns-

allinone-2.34/otcl-1.13:/home/usman/ns-allinone-2.34/lib9. export

TCL_LIBRARY=$TCL_LIBRARY:/home/usman/ns-allinone-2.34/tcl8.4.18/library

Page 14: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

10. # User specific aliases and functions11.12. alias rm='rm -i'13. alias cp='cp -i'14. alias mv='mv -i'15.16. # Source global definitions17. if [ -f /etc/bashrc ]; then18. 19. . /etc/bashrc

NS2 INTRODUCTION:

Features of NS2:

Protocols: TCP, UDP, HTTP, Routing algorithms, MAC etc.

● Traffic Models: CBR, VBR, Web etc● Error Models: Uniform, bursty etc● Misc: Radio propagation, Mobility models , Energy Models● Topology Generation tools● Visualization tools (NAM), Tracing

NS is an object oriented discrete event simulator

Simulator maintains list of events and executes one event after another.

Single thread of control: no locking or race conditions.● Back end is C++ event scheduler.

Protocols mostlyFast to run, more control

● Front end is oTCLCreating scenarios, extensions to C++ protocolsfast to write and change

NodesSet properties like queue length, location, Protocols, routing algorithmsLinks

Page 15: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

Set types of link i.e. Simplex, duplex, wireless, satellite Set bandwidth, latency etc.

TCL Syntax:

● Variables:● Arrays:● Printing:● Arithmetic Expression:● Control Structures:● Procedures:

Syntax:

set x 1set y $xset a(0) 1puts “$a(0) \n”set z = [expr $y + 5]if {$z == 6} then { puts “Correct!”}for {set i =0} {$i < 5} {incr i }{puts “$i * $i equals [expr $i * $i]”}proc sum {a b} {return [expr $a + $b]}

NS programming Structure

● Create the event scheduler● Turn on tracing● Create network topology● Create transport connections● Generate traffic● Insert errors

Creating Event Scheduler

● Create event scheduler: set ns [new simulator]● Schedule an event: $ns at <time> <event>

event is any legitimate ns/tcl function

● Start Scheduler$ns at 5.0 “finish”$ns run

Page 16: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

proc finish {} {global ns nfclose $nfexec nam out.nam &exit 0}

Tracing● All packet trace● Variable trace$ns traceall[open out.tr w]<event> <time> <from> <to> <pkt> <size><flowid> <src> <dst> <seqno> <aseqno>+ 0.51 0 1 cbr 500 00.0 1.0 0 20.510 1 cbr 500 00.0 1.0 0 2r 0.514 0 1 cbr 500 00.0 1.0 0 0set par [open output/param.tr w]$tcp attach $par$tcp trace cwnd_$tcp trace maxseq_$tcp trace rtt_

Tracing and Animation

Network Animator

set nf [open out.nam w]$ns namtraceall$nfproc finish {} {global ns nfclose $nfexec nam out.nam &exit 0}

Creating topology

● Two nodes connected by a link● Creating nodes

Page 17: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

● Creating link between nodes

– $ns <link_type> $n0 $n1 <bandwidth> <delay> <queuetype>set n0 [$ns node]set n1 [$ns node]$ns duplexlink$n0 $n1 1Mb 10ms DropTail

Sending data● Create UDP agent● Create CBR traffic source for feeding into UDP agent● Create traffic sinkset udp0 [new Agent/UDP]$ns attachagent$n0 $udp0set cbr0 [new Application/Traffic/CBR]$cbr0 set packetSize_ 500$cbr0 set interval_ 0.005$cbr0 attachagent$udp0set null0 [new Agent/Null]$ns attachagent$n1 $null0

Sending data● Connect two agents● Start and stop of data$ns connect $udp0 $null0$ns at 0.5 “$cbr0 start”$ns at 4.5 “$cbr0 stop”

Page 18: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

Creating TCP Connections● Create TCP agent and attach it to the node● Create a Null Agent and attach it to the node● Connect the agentsset tcp0 [new Agent/TCP]$ns attachagent$n0 $tcp0set null0 [new Agent/TCPSink]$ns attachagent$n1 $null0$ns connect $tcp0 $null0

Traffic on top of TCP

FTPTelnetset ftp [new Application/FTP]$ftp attachagent$tcp0set telnet [new Application/Telnet]$telnet attachagent$tcp0

Introducing Errors

Creating Error ModuleInserting Error Moduleset err [new ErrorModel]$err unit pkt_$err set rate_ 0.01$err ranvar [new RandomVariable/Uniform]$err droptarget[new Agent/Null]

Page 19: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

$ns lossmodel $err $n0 $n1

Examples● UDP Script● Tracing (wired,wireless,tcp)● TCP without Loss● TCP with Loss

OTCL HIERARCHY:

7. Simulation with 2 nodes

Getting Started with an example:

Creating a Simple Topology Getting Traces Using NAM

Simple Example with two Nodes

#create a new simulator object

Page 20: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

set ns [new Simulator]#open the nam trace fileset nf [open out.nam w]$ns namtrace-all $nf#define a 'finish' procedureproc finish {} { global ns nf $ns flush-trace #close the trace file close $nf #execute nam on the trace file exec nam out.nam & exit 0}

set ns [new Simulator]: generates an NS simulator object instance, and assigns it to variable ns (italics is used for variables and values in this section). What this line does is the following:  Create a scheduler (default is calendar scheduler)   The "Simulator" object has member functions that do the following:  Create compound objects such as nodes and links (described later) Connect network component objects created (ex. attach-agent) Set network component parameters (mostly for compound objects) Create connections between agents (ex. make connection between a "tcp" and "sink")   Now, We are going to extend the example now: we are going to attach a udp agent to n1 and a sink at n2. (agents are abstractions – of “sockets” that are present in unix)We are going to use udp to send constant bit-rate traffic – what this means is – that the rate is constant and packet size is constant (we will set these parameters)

#create a udp agent and attach it to node n0set udp0 [new Agent/UDP]$ns attach-agent $n0 $udp0#Create a CBR traffic source and attach it to udp0set cbr0 [new Application/Traffic/CBR]

Page 21: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

$cbr0 set packetSize_ 500$cbr0 set interval_ 0.005$cbr0 attach-agent $udp0#create a Null agent(a traffic sink) and attach it to node n1set null0 [new Agent/Null]$ns attach-agent $n1 $null0#Connect the traffic source to the sink$ns connect $udp0 $null0#Schedule events for CBR traffic$ns at 0.5 "$cbr0 start"$ns at 4.5 "$cbr0 stop"#call the finish procedure after 5 secs of simulated time$ns at 5.0 "finish"#run the simulation$ns run

$ns attach-agent node agent: The attach-agent member function attaches an agent object created to a node object. Actually, what this function does is call the attach member function of specified node, which attaches the given agent to itself. Therefore, a user can do the same thing by, for example, $n0 attach $tcp. Similarly, each agent object has a member function attach-agent that attaches a traffic source object to itself.  $ns connect agent1 agent2: After two agents that will communicate with each other are created, the next thing is to establish a logical network connection between them. This line establishes a network connection by setting the destination address to each others' network and port address pair.

Page 22: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

Lab 8:

A Simple Network Topology and Simulation Scenario

This network consists of 4 nodes (n0, n1, n2, n3) as shown in above figure. The duplex links between n0 and n2, and n1 and n2 have 2 Mbps of bandwidth and 10 ms of delay. The duplex link between n2 and n3 has 1.7 Mbps of bandwidth and 20 ms of delay. Each node uses a DropTail queue, of which the maximum size is 10. A "tcp" agent is attached to n0, and a connection is established to a tcp "sink" agent attached to n3. As default, the maximum size of a packet that a "tcp" agent can generate is 1KByte. A tcp "sink" agent generates and sends ACK packets to the sender (tcp agent) and frees the received packets. A "udp" agent that is attached to n1

Page 23: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

is connected to a "null" agent attached to n3. A "null" agent just frees the packets received. A "ftp" and a "cbr" traffic generator are attached to "tcp" and "udp" agents respectively, and the "cbr" is configured to generate 1 KByte packets at the rate of 1 Mbps. The "cbr" is set to start at 0.1 sec and stop at 4.5 sec, and "ftp" is set to start at 1.0 sec and stop at 4.0 sec.

The code is as follows:

#Create a simulator objectset ns [new Simulator]

#Define different colors for data flows (for NAM)$ns color 1 Blue$ns color 2 Red

#Open the NAM trace fileset nf [open out.nam w]$ns namtrace-all $nf

#Define a 'finish' procedureproc finish {} { global ns nf $ns flush-trace #Close the NAM trace file close $nf #Execute NAM on the trace file exec nam out.nam & exit 0}

#Create four nodesset n0 [$ns node]set n1 [$ns node]set n2 [$ns node]set n3 [$ns node]

#Create links between the nodes$ns duplex-link $n0 $n2 2Mb 10ms DropTail$ns duplex-link $n1 $n2 2Mb 10ms DropTail$ns duplex-link $n2 $n3 1.7Mb 20ms DropTail

#Set Queue Size of link (n2-n3) to 10$ns queue-limit $n2 $n3 10

#Give node position (for NAM)$ns duplex-link-op $n0 $n2 orient right-down$ns duplex-link-op $n1 $n2 orient right-up

Page 24: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

$ns duplex-link-op $n2 $n3 orient right

#Monitor the queue for link (n2-n3). (for NAM)$ns duplex-link-op $n2 $n3 queuePos 0.5

#Setup a TCP connectionset tcp [new Agent/TCP]$tcp set class_ 2$ns attach-agent $n0 $tcpset sink [new Agent/TCPSink]$ns attach-agent $n3 $sink$ns connect $tcp $sink$tcp set fid_ 1

#Setup a FTP over TCP connectionset ftp [new Application/FTP]$ftp attach-agent $tcp$ftp set type_ FTP

#Setup a UDP connectionset udp [new Agent/UDP]$ns attach-agent $n1 $udpset null [new Agent/Null]$ns attach-agent $n3 $null$ns connect $udp $null$udp set fid_ 2

#Setup a CBR over UDP connectionset cbr [new Application/Traffic/CBR]$cbr attach-agent $udp$cbr set type_ CBR$cbr set packet_size_ 1000$cbr set rate_ 1mb$cbr set random_ false

#Schedule events for the CBR and FTP agents$ns at 0.1 "$cbr start"$ns at 1.0 "$ftp start"$ns at 4.0 "$ftp stop"$ns at 4.5 "$cbr stop"

#Detach tcp and sink agents (not really necessary)$ns at 4.5 "$ns detach-agent $n0 $tcp ; $ns detach-agent $n3 $sink"

#Call the finish procedure after 5 seconds of simulation time$ns at 5.0 "finish"

#Print CBR packet size and interval

Page 25: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

puts "CBR packet size = [$cbr set packet_size_]"puts "CBR interval = [$cbr set interval_]"

#Run the simulation$ns run

Explanation:

The following is the explanation of the script above. In general, an NS script starts with making a Simulator object instance.

set ns [new Simulator]: generates an NS simulator object instance, and assigns it to variable ns (italics is used for variables and values in this section). What this line does is the following: 

o Initialize the packet format (ignore this for now)o Create a scheduler (default is calendar scheduler)o Select the default address format (ignore this for now)

 

The "Simulator" object has member functions that do the following: 

o Create compound objects such as nodes and links (described later)

o Connect network component objects created (ex. attach-agent)

o Set network component parameters (mostly for compound objects)

o Create connections between agents (ex. make connection between a "tcp" and "sink")

o Specify NAM display optionso Etc.

 

Most of member functions are for simulation setup (referred to as plumbing functions in the Overview section) and scheduling, however some of them are for the NAM display. The "Simulator" object member function implementations are located in the "ns-2/tcl/lib/ns-lib.tcl" file. 

$ns color fid color: is to set color of the packets for a flow specified by the flow id (fid). This member function of "Simulator" object is

Page 26: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

for the NAM display, and has no effect on the actual simulation.  

$ns namtrace-all file-descriptor: This member function tells the simulator to record simulation traces in NAM input format. It also gives the file name that the trace will be written to later by the command $ns flush-trace. Similarly, the member function trace-all is for recording the simulation trace in a general format. 

proc finish {}: is called after this simulation is over by the command $ns at 5.0 "finish". In this function, post-simulation processes are specified. 

set n0 [$ns node]: The member function node creates a node. A node in NS is compound object made of address and port classifiers (described in a later section). Users can create a node by separately creating an address and a port classifier objects and connecting them together. However, this member function of Simulator object makes the job easier. To see how a node is created, look at the files: "ns-2/tcl/libs/ns-lib.tcl" and "ns-2/tcl/libs/ns-node.tcl". 

$ns duplex-link node1 node2 bandwidth delay queue-type: creates two simplex links of specified bandwidth and delay, and connects the two specified nodes. In NS, the output queue of a node is implemented as a part of a link, therefore users should specify the queue-type when creating links. In the above simulation script, DropTail queue is used. If the reader wants to use a RED queue, simply replace the word DropTail with RED. The NS implementation of a link is shown in a later section. Like a node, a link is a compound object, and users can create its sub-objects and connect them and the nodes. Link source codes can be found in "ns-2/tcl/libs/ns-lib.tcl" and "ns-2/tcl/libs/ns-link.tcl" files. One thing to note is that you can insert error modules in a link component to simulate a lossy link (actually users can make and insert any network objects). Refer to the NS documentation to find out how to do this. 

$ns queue-limit node1 node2 number: This line sets the queue limit of the two simplex links that connect node1 and node2 to the number specified. At this point, the authors do not know how many of these kinds of member functions of Simulator objects are available and what they are. Please take a look at "ns-2/tcl/libs/ns-lib.tcl" and "ns-

Page 27: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

2/tcl/libs/ns-link.tcl", or NS documentation for more information. 

$ns duplex-link-op node1 node2 ...: The next couple of lines are used for the NAM display. To see the effects of these lines, users can comment these lines out and try the simulation.

Now that the basic network setup is done, the next thing to do is to setup traffic agents such as TCP and UDP, traffic sources such as FTP and CBR, and attach them to nodes and agents respectively.

set tcp [new Agent/TCP]: This line shows how to create a TCP agent. But in general, users can create any agent or traffic sources in this way. Agents and traffic sources are in fact basic objects (not compound objects), mostly implemented in C++ and linked to OTcl. Therefore, there are no specific Simulator object member functions that create these object instances. To create agents or traffic sources, a user should know the class names these objects (Agent/TCP, Agnet/TCPSink, Application/FTP and so on). This information can be found in the NS documentation or partly in this documentation. But one shortcut is to look at the "ns-2/tcl/libs/ns-default.tcl" file. This file contains the default configurable parameter value settings for available network objects. Therefore, it works as a good indicator of what kind of network objects are available in NS and what are the configurable parameters. 

$ns attach-agent node agent: The attach-agent member function attaches an agent object created to a node object. Actually, what this function does is call the attach member function of specified node, which attaches the given agent to itself. Therefore, a user can do the same thing by, for example, $n0 attach $tcp. Similarly, each agent object has a member function attach-agent that attaches a traffic source object to itself. 

$ns connect agent1 agent2: After two agents that will communicate with each other are created, the next thing is to establish a logical network connection between them. This line establishes a network connection by setting the destination address to each others' network and port address pair.

Assuming that all the network configuration is done, the next thing to do is write a simulation scenario (i.e. simulation scheduling). The Simulator

Page 28: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

object has many scheduling member functions. However, the one that is mostly used is the following:

$ns at time "string": This member function of a Simulator object makes the scheduler (scheduler_ is the variable that points the scheduler object created by [new Scheduler] command at the beginning of the script) to schedule the execution of the specified string at given simulation time. For example, $ns at 0.1 "$cbr start" will make the scheduler call a start member function of the CBR traffic source object, which starts the CBR to transmit data. In NS, usually a traffic source does not transmit actual data, but it notifies the underlying agent that it has some amount of data to transmit, and the agent, just knowing how much of the data to transfer, creates packets and sends them.

After all network configuration, scheduling and post-simulation procedure specifications are done, the only thing left is to run the simulation. This is done by $ns run.

Lab 9. The Command Line Interface:This chapter provides information and commands concerning the following topics:• Shortcuts for entering commands• Using the † key to enter complete commands• Using the question mark for help• enable command• exit command• disable command• Logout command• Setup mode• Keyboard help• History commands• show commands

Shortcuts for Entering CommandsTo enhance efficiency, Cisco IOS Software has some shortcuts for entering commands.Although these are great to use in the real world, when it comes time to write a vendor exam, make sure you know the full commands, not just the shortcuts.

Page 29: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

Using the tab Key to Complete CommandsWhen you are entering a command, you can use the tab key to complete the command. Enter the first few characters of a command and press the tab key. If the characters are unique to the command, the rest of the command is entered in for you. This is helpful if you are unsure about the spelling of a command.

Using the Question Mark for Help

The following output shows you how using the question mark can help you work through a command and all its parameters.

Page 30: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

Enable Command

Exit Command

Disable Command

Logout Command

Setup ModeSetup mode start automatically if there is no startup configuration present.

Page 31: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

NOTE: The answer inside the square brackets, [ ], is the default answer. If this is the answer you want, just press Enter. Pressing cntrl+c at any time will end the setup process, shut down all interfaces, and take you to user mode (Router>)NOTE: You cannot use setup mode to configure an entire router. It does only the basics. For example, you can only turn on either RIP v1 or Interior Gateway Routing Protocol (IGRP), but not Open Shortest Path First Protocol (OSPF) or Enhanced Interior Gateway Routing Protocol (EIGRP). You cannot create access control lists (ACL) here or enable Network Address Translation (NAT). You can assign an IP address to an interface, but not to a subinterface. All in all, setup mode is very limiting.Entering setup mode is not a recommended practice. Instead, you should use the command-line interface (CLI), which is more powerful:Would you like to enter the initial configuration dialog? [yes] : noWould you like to enable autoinstall? [yes] : noAuto install is a feature that tries to broadcast out all interfaces when attempting to find a configuration. If you answer yes, you must wait for a few minutes while it looks for a configuration to load. Very frustrating. Answer no.

Keyboard HelpThe keystrokes in the following table are meant to help you edit the configuration. Because you’ll want to perform certain tasks again and again, Cisco IOS Software provides certain keystroke combinations to help make the process more efficient.

Page 32: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

History Commands

Page 33: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

NOTE: The history size command provides the same function as the terminal history size command. Be careful when you set the size to something larger than the default. By telling the router to keep the last 256 commands in a buffer, you are taking memory away from other parts of the router. What would you rather have: a router that remembers what you last typed in, or a router that routes as efficiently as possible?

Show Commands

NOTE: The last line of output from the show version command tells you what the configuration register is set to.

10. Configuring a Single Cisco Router This chapter provides information and commands concerning the following topics:

• Router modes• Entering global configuration mode• Configuring a router, specifically— Names— Passwords— Password encryption— Interface names— Moving between interfaces— Configuring a serial interface— Configuring a Fast Ethernet interface— Creating a message-of-the-day (MOTD) banner— Creating a login banner— Setting the clock time zone— Assigning a local host name to an IP address— The no ip domain-lookup command— The logging synchronous command— The exec-timeout command— Saving configurations— Erasing configurations• show commands to verify the router configurations• EXEC commands in configuration mode: the do commandRouter Modes

Page 34: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

TIP: There are other modes than these. Not all commands work in all modes. Becareful. If you type in a command that you know is correct—show running-config, for example—and you get an error, make sure that you are in the correct mode.

Entering Global Configuration Mode

Configuring a Router NameThis command works on both routers and switches.

Configuring PasswordsThese commands work on both routers and switches.

Page 35: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

CAUTION: The enable secret password is encrypted by default. The enable password is not. For this reason, recommended practice is that you never use the enable password command. Use only the enable secret password command in a router or switch configuration. You cannot set both enable secret password and enable password to the same password. Doing so defeats the use of encryption.

Password Encryption

Page 36: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

CAUTION: If you have turned on service password encryption, used it, and then turned it off, any passwords that you have encrypted will stay encrypted. New passwords will remain unencrypted.

Interface NamesOne of the biggest problems that new administrators face is the interface names on the different models of routers. With all the different Cisco devices in production networks today, some administrators are becoming confused about the names of their interfaces.The following chart is a sample of some of the different interface names for various routers. This is by no means a complete list. Refer to the hardware guide of the specific router that you are working on to see the different combinations, or use the following command to see which interfaces are installed on your particular router: router#show ip interface brief

Page 37: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2
Page 38: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

Moving Between InterfacesWhat happens in Column 1 is the same thing occurring in Column 3.

Page 39: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

Configuring a Serial Interface

TIP: The clock rate command is used only on a serial interface that has a DCE cable plugged into it. There must be a clock rate set on every serial link between routers. It does not matter which router has the DCE cable plugged into it or which interface the cable is plugged into. Serial 0 on one router can be plugged into Serial 1 on another router.Configuring a Fast Ethernet Interface

Creating a Message-of-the-Day Banner

Page 40: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

TIP: The MOTD banner is displayed on all terminals and is useful for sending messages that affect all users. Use the no banner motd command to disable the MOTD banner. The MOTD banner displays before the login prompt and the login banner, if one has been created.Creating a Login Banner

TIP: The login banner displays before the username and password login prompts. Use the no banner login command to disable the login banner. The MOTD banner displays before the login banner.

Setting the Clock Time Zone

Assigning a Local Host Name to an IP Address

TIP: The default port number in the ip host command is 23, or Telnet. If you wantto Telnet to a device, just enter the IP host name itself:

Page 41: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

Router#london = Router#telnet london = Router#telnet 172.16.1.3

The no ip domain-lookup Command

TIP: Ever type in a command incorrectly and are left having to wait for a minute or two as the router tries to translate your command to a domain server of 255.255.255.255? The router is set by default to try to resolve any word that is not a command to a Domain Name System (DNS) server at address 255.255.255.255.If you are not going to set up DNS, turn off this feature to save you time as you type, especially if you are a poor typist.The logging synchronous Command

TIP: Ever try to type in a command and an informational line appears in the middle of what you were typing? Lose your place? Do not know where you are in the command, so you just press R and start all over? The logging synchronous command tells the router that if any informational items get displayed on the screen, your prompt and command line should be moved to a new line, so as not to confuse you.The informational line does not get inserted into the middle of the command you are trying to type. If you were to continue typing, the command would execute properly, even though it looks wrong on the screen.The exec-timeout Command

Page 42: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

TIP: The command exec-timeout 0 0 is great for a lab environment because the console never logs out. This is considered to be bad security and is dangerous in the real world. The default for the exec-timeout command is 10 minutes and zero (0) seconds (exec-timeout 10 0).Saving Configurations

Erasing Configurations

TIP: The running configuration is still in dynamic memory. Reload the router toclear the running configuration.

show Commands

Page 43: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

EXEC Commands in Configuration Mode: The do Command

Page 44: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

TIP: The do command is useful when you want to execute EXEC commands, such as show, clear, or debug, while remaining in global configuration mode or in any configuration sub mode. You cannot use the do command to execute the configure terminal command because it is the configure terminal command that changes the mode to global configuration mode.Configuration Example: Basic Router ConfigurationFigure 4-1 illustrates the network topology for the configuration that follows, which shows a basic router configuration using the commands covered in this chapter.Figure 4-5 Network Topology for Basic Router Configuration

Page 45: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2
Page 46: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

11. Configuring Static Routing:This chapter provides information and commands concerning the following topics:• Configuring a static route on a router• The permanent keyword (optional)• Static routes and administrative distance (optional)• Configuring a default route on a router• Verifying static routes• Configuration example: Static routes

Configuring a Static Route on a RouterWhen using the ip route command, you can identify where packets should be routed in two ways:• The next-hop address• The exit interface

Page 47: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

Both ways are shown in the “Configuration Example: Static Routes” and the “Configuring a Default Route on a Router” sections.

The permanent Keyword (Optional)Without the permanent keyword in a static route statement, a static route will be removed if an interface goes down. A downed interface will cause the directly connected network and any associated static routes to be removed from the routing table. If the interface comes back up, the routes are returned.Adding the permanent keyword to a static route statement will keep the static routes in the routing table even if the interface goes down and the directly connected networks are removed. You cannot get to these routes—the interface is down—but the routes remain in the table. The advantage to this is that when the interface comes back up, the static routes do not need to be reprocessed and placed back into the routing table, thus saving time and processing power.When a static route is added or deleted, this route, along with all other static routes, is processed in one second. Before Cisco IOS Software Release 12.0, this processing time was five seconds.The routing table processes static routes every minute to install or remove static routes according to the changing routing table.To specify that the route will not be removed, even if the interface shuts down, enter the following command, for example:Router(config)#ip route 172.16.20.0 255.255.255.0 172.16.10.2permanentStatic Routes and Administrative Distance (Optional)

Page 48: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

To specify that an administrative distance of 200 has been assigned to a given route, enter the following command, for example:Router(config)#ip route 172.16.20.0 255.255.255.0 172.16.10.2 200By default, a static route is assigned an administrative distance (AD) of 1. Administrative distance rates the “trustworthiness” of a route. AD is a number from 0 through 255, where 0 is absolutely trusted and 255 cannot be trusted at all. Therefore, an AD of 1 is an extremely reliable rating, with only an AD of 0 being better. An AD of 0 is assigned to a directly connected route. The following table lists the administrative distance for each type of route.

By default, a static route is always used rather than a routing protocol. By adding an AD number to your ip route statement, however, you can effectively create a backup route to your routing protocol. If your network is using EIGRP, and you need a backup route, add a static route with an AD greater than 90. EIGRP will be used because its AD is better (lower) than the static route. If EIGRP goes down, however, the static route will be used in its place. This is known as a floating static route.If a static route refers to an exit interface rather than a next-hop address, the destination is considered to be directly connected and is therefore given an AD of 0 rather than 1.

Configuring a Default Route on a Router

Page 49: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

Verifying Static RoutesTo display the contents of the IP routing table, enter the following command:Router#show ip routeNOTE: The codes to the left of the routes in the table tell you from where the router learned the routes. A static route is described by the letter S.Configuration Example: Static RoutesFigure 5-1 illustrates the network topology for the configuration that follows, which shows how to configure static routes using the commands, covered in this chapter.Figure5-6 Network Topology for Static Route Configuration

Page 50: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

12. Configuring RIPThis chapter provides information and commands concerning the following topics:• The ip classless command• RIP routing: mandatory commands• RIP routing: optional commands• Troubleshooting RIP issues

Page 51: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

• Configuration example: RIPv2 routingThe ip classless Command

NOTE: A supernet route is a route that covers a range of subnets with a single entry.NOTE: The ip classless command is enabled by default in Cisco IOS Software Release 11.3 and later.RIP Routing: Mandatory Commands

NOTE: You need to advertise only the classful network number, not a subnet:Router(config-router)#network 172.16.0.0 notRouter(config-router)#network 172.16.10.0If you advertise a subnet, you will not receive an error message, because the router will automatically convert the subnet to the classful network address.

RIP Routing: Optional Commands

Page 52: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

Configuration Example: RIPv2 RoutingFigure 6-1 illustrates the network topology for the configuration that follows, which shows how to configure RIPv2 using the commands covered in this chapter.Figure6-7 Network Topology for RIPv2 Routing Configuration

Page 53: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

NOTE: The host name, password, and interfaces have all been configured as per the configuration example in Chapter 6, “Configuring a Single Cisco Router.”

Page 54: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2
Page 55: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

13. Configuring Enhanced Interior Gateway Routing Protocol (EIGRP)

This chapter provides information and commands concerning the following topics:• Configuring Enhanced Interior Gateway Routing Protocol (EIGRP)• EIGRP auto-summarization• Load balancing: variance• Bandwidth use• Authentication• Verifying EIGRP• Troubleshooting EIGRP• Configuration example: EIGRPConfiguring Enhanced Interior Gateway Routing Protocol (EIGRP)

Page 56: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

NOTE: tos is a reference to the original Interior Gateway Routing Protocol (IGRP) intention to have IGRP perform type-of-service routing. Because this was never adopted into practice, the tos field in this command is always set to zero (0).NOTE: With default settings in place, the metric of EIGRP is reduced to the slowest bandwidth plus the sum of all the delays of the exit interfaces from the local router to the destination network.TIP: For two routers to form a neighbor relationship in EIGRP, the k values must match.CAUTION: Unless you are very familiar with what is occurring in your network, it is recommended that you do not change the k values.EIGRP Auto-Summarization

Page 57: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

CAUTION: EIGRP automatically summarizes networks at the classful boundary. A poorly designed network with discontiguous subnets could have problems with connectivity if the summarization feature is left on. For instance, you could have two routers advertise the same network—172.16.0.0/16—when in fact they wanted to advertise two different networks—172.16.10.0/24 and 172.16.20.0/24.Recommended practice is that you turn off automatic summarization if necessary, use the ip summary-address command, and summarize manually what you need to.Load Balancing: variance

NOTE: If a path is not a feasible successor, it is not used in load balancing.NOTE: EIGRP supports up to six unequal-cost paths.

Page 58: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

Bandwidth Use

NOTE: By default, EIGRP is set to use only up to 50 percent of the bandwidth of an interface to exchange routing information. Values greater than 100 percent can be configured. This configuration option might prove useful if the bandwidth is set artificially low for other reasons, such as manipulation of the routing metric or to accommodate an oversubscribed multipoint Frame Relay configuration.NOTE: The ip bandwidth-percent command relies on the value set by the bandwidth command.Authentication

Page 59: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

NOTE: For the start time and the end time to have relevance, ensure that the router knows the correct time. Recommended practice dictates that you run Network Time Protocol (NTP) or some other time-synchronization method if you intend to set lifetimes on keys.

Page 60: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

Verifying EIGRP

Troubleshooting EIGRP

Configuration Example: EIGRPFigure 7-1 illustrates the network topology for the configuration that follows, which shows how to configure EIGRP using the commands covered in this chapter.Figure 7-8 Network Topology for EIGRP Configuration

Page 61: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

Austin Router

Page 62: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2
Page 63: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

14. Single Area OSPF

This chapter provides information and commands concerning the following topics:• Configuring OSPF: Mandatory commands• Using wildcard masks with OSPF areas• Configuring OSPF: Optional commands— Loopback interfaces— Router ID— DR/BDR elections— Modifying cost metrics— Authentication: Simple

Page 64: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

— Authentication: Using MD5 encryption— Timers— Propagating a default route• Verifying OSPF configuration• Troubleshooting OSPF• Configuration example: Single area OSPFConfiguring OSPF: Mandatory Commands

Using Wildcard Masks with OSPF AreasWhen compared to an IP address, a wildcard mask identifies which addresses get matched for placement into an area:• A 0 (zero) in a wildcard mask means to check the corresponding bit in the address for an exact match.• A 1 (one) in a wildcard mask means to ignore the corresponding bit in the address— can be either 1 or 0.Example 1: 172.16.0.0 0.0.255.255172.16.0.0 = 10101100.00010000.00000000.000000000.0.255.255 = 00000000.00000000.11111111.11111111 result = 10101100.00010000.xxxxxxxx.xxxxxxxx

Page 65: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

172.16.x.x (Anything between 172.16.0.0 and 172.16.255.255 will match the example statement.)TIP: An octet of all 0s means that the octet has to match exactly to the address.An octet of all 1s means that the octet can be ignored.Example 2: 172.16.8.0 0.0.7.255172.168.8.0 = 10101100.00010000.00001000.000000000.0.0.7.255 = 00000000.00000000.00000111.11111111result = 10101100.00010000.00001xxx.xxxxxxxx00001xxx = 00001000 to 00001111 = 8–15xxxxxxxx = 00000000 to 11111111 = 0–255Anything between 172.16.8.0 and 172.16.15.255 will match the example statement.

Configuring OSPF: Optional CommandsThe following commands, although not mandatory, enable you to have a more controlled and efficient deployment of OSPF in your network. Loopback Interfaces

Page 66: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2
Page 67: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2
Page 68: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2
Page 69: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2
Page 70: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

Configuration Example: Single Area OSPFFigure 8-1 illustrates the network topology for the configuration that follows, which shows how to configure Single Area OSPF using commands covered in this chapter.Figure 8-9 Network Topology for Single Area OSPF Configuration

Page 71: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2
Page 72: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2
Page 73: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

15. Configuring a Switch:

This chapter provides information and commands concerning the following topics:• Help commands• Command modes• Verifying commands• Resetting switch configuration• Setting host names• Setting passwords• Setting IP addresses and default gateways• Setting interface descriptions

Page 74: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

• Setting duplex operation• Setting operation speed• Managing the MAC address table• Configuring static MAC addresses• Switch port security• Verifying switch port security• Sticky MAC addresses• Configuration example

Help Commands

Command Modes

Verifying Commands

Page 75: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2
Page 76: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

Resetting Switch Configuration

Setting Host Names

Setting PasswordsSetting passwords for the 2960 series switches is the same method as used for a router.

Page 77: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

Setting IP Addresses and Default Gateways

TIP: For the 2960 series switches, the IP address of the switch is just that—the IP address for the entire switch. That is why you set the address in VLAN 1 (the default VLAN of the switch) and not in a specific Ethernet interface.

Setting Interface Descriptions

TIP: The 2960 series switches have either 12 or 24 Fast Ethernet ports named fa0/1, fa0/2, ... fa0/24—there is no fastethernet 0/0.

Page 78: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

Setting Duplex Operation

Setting Operation Speed

Managing the MAC Address Table

Configuring Static MAC Addresses

Page 79: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

Switch Port Security

Page 80: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

Verifying Switch Port Security

Page 81: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

Sticky MAC AddressesSticky MAC addresses are a feature of port security. Sticky MAC addresses limit switch port access to a specific MAC address that can be dynamically learned, as opposed to a network administrator manually associating a MAC address with a specific switch port. These addresses are stored in the running configuration file. If this file is saved, the sticky MAC addresses do not have to be relearned when the switch is rebooted, and thus provide a high level of switch port security.

Page 82: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

Configuration ExampleFigure 9-1 shows the network topology for the basic configuration of a 2960 series switch using commands covered in this chapter.Figure 9-1 Network Topology for 2960 Series Switch Configuration

Page 83: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2
Page 84: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2
Page 85: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

16. Virtual LAN:

This chapter provides information and commands concerning the following topics:• Creating static VLANs— Using VLAN configuration mode— Using VLAN database mode• Assigning ports to VLANs• Using the range command• Verifying VLAN information• Saving VLAN configurations• Erasing VLAN configurations• Configuration example: VLANsCreating Static VLANsStatic VLANs occur when a switch port is manually assigned by the network administrator to belong to a VLAN. Each port is associated with a specific VLAN. By default, all ports are originally assigned to VLAN 1. You can create VLANs in two different ways:• Using the VLAN configuration mode, which is the recommended way to create VLANs• Using the VLAN database mode (which should not be used but is still available) Using VLAN Configuration Mode

NOTE: This method is the only way to configure extended-range VLANs (VLANIDs from 100 to 4094).NOTE: Regardless of the method used to create VLANs, the VTP revision numberis increased by 1 each time a VLAN is created or changed.Using VLAN Database ModeCAUTION: The VLAN database mode has been deprecated and will be removed in some future Cisco IOS Software release. It is recommended to use only VLAN configuration mode.

Page 86: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

NOTE: You must apply the changes to the VLAN database for the changes to take effect. You must use either the apply command or the exit command to do so. Using the C-Zcommand to exit out of the VLAN database does not work in this mode because it aborts all changes made to the VLAN database—you must either use exit or apply and then the exit command.Assigning Ports to VLANs

NOTE: When the switchport mode access command is used, the port operates as a nontrunking, single VLAN interface that transmits and receives non encapsulated frames.An access port can belong to only one VLAN.

Page 87: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

Using the range Command

Verifying VLAN Information

Saving VLAN ConfigurationsThe configurations of VLANs 1 through 1005 are always saved in the VLAN database. As long as the apply or the exit command is executed in VLAN database mode, changes are saved. If you are using VLAN configuration mode, the exit command saves the changes to the VLAN database, too.If the VLAN database configuration is used at startup, and the startup configuration file contains extended-range VLAN configuration, this information is lost when the system boots. If you are using VTP transparent mode, the configurations are also saved in the running configuration and can be saved to the startup configuration using the copy running-config startup-config command.If the VTP mode is transparent in the startup configuration, and the VLAN database and the VTP domain name from the VLAN database matches that in the startup configuration file, the VLAN database is ignored (cleared), and the VTP and VLAN configurations in the startup configuration file are used. The VLAN database revision number remains unchanged in the VLAN database.

Page 88: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

Erasing VLAN Configurations

NOTE: When you delete a VLAN from a switch that is in VTP server mode, the VLAN is removed from the VLAN database for all switches in the VTP domain. When you delete a VLAN from a switch that is in VTP transparent mode, the VLAN is deleted only on that specific switch.NOTE: You cannot delete the default VLANs for the different media types:Ethernet VLAN 1 and FDDI or Token Ring VLANs 1002 to 1005.CAUTION: When you delete a VLAN, any ports assigned to that VLAN become inactive. They remain associated with the VLAN (and thus inactive) until you assign them to a new VLAN. Therefore, it is recommended that you reassign ports to a new VLAN or the default VLAN before you delete a VLAN from the VLAN database.Configuration Example: VLANs

Page 89: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

Figure 10-1 illustrates the network topology for the configuration that follows, which shows how to configure VLANs using the commands covered in this chapter.Figure 10-2 Network Topology for VLAN Configuration Example

2960 Switch

Page 90: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2
Page 91: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

17. VLAN Trunking Protocol and Inter VLAN Routing

This chapter provides information and commands concerning the following topics:• Dynamic Trunking Protocol (DTP)• Setting the encapsulation type• VLAN Trunking Protocol (VTP)— Using global configuration mode— Using VLAN database mode• Verifying VTP• Inter-VLAN communication using an external router: Router-on-a-stick• Inter-VLAN communication tips• Configuration example: Inter-VLAN communication

Page 92: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

Dynamic Trunking Protocol (DTP)

TIP: The default mode is dependent on the platform. For the 2960, the default mode is dynamic auto.TIP: On a 2960 switch, the default for all ports is to be an access port. However, with the default DTP mode being dynamic auto, an access port can be converted

Page 93: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

into a trunk port if that port receives DTP information from the other side of the link if that side is set to trunk or desirable. It is therefore recommended to hardcode all access ports as access ports with the switchport mode access command. This way, DTP information will not inadvertently change an access port to a trunk port. Any port set with the switchport mode access command ignores any DTP requests to convert the link.Setting the Encapsulation TypeDepending on the series of switch that you are using, you might have a choice as to what type of VLAN encapsulation you want to use: the Cisco proprietary Inter-Switch Link (ISL) or the IEEE Standard 802.1q (dot1q). The 2960 switch supports only dot1q trunking.

TIP: With the switchport trunk encapsulation negotiate command set, the preferred trunking method is ISL.CAUTION: The 2960 series switch supports only dot1q trunking.VLAN Trunking Protocol (VTP)VTP is a Cisco proprietary protocol that allows for VLAN configuration (addition, deletion, or renaming of VLANs) to be consistently maintained across a common administrative domain.

Page 94: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

Using Global Configuration Mode

Page 95: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

NOTE: Only VLANs included in the pruning-eligible list can be pruned. VLANs 2 through 1001 are pruning eligible by default on trunk ports. Reserved VLANs and extended-range VLANs cannot be pruned. To change which eligible VLANs can be pruned, use the interface-specific switchport trunk pruning vlan command:Switch(config-if)# switchport trunk pruning vlan remove 4, 20-30 ! Removes VLANs 4 and 20-30Switch(config-if)#switchport trunk pruning vlan except 40-50! All VLANs are added to the pruning list except for 40-50Using VLAN Database Mode

CAUTION: The VLAN database mode has been deprecated and will be removed in some future Cisco IOS release. Recommended practice dictates using only the VLAN configuration mode.

Page 96: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2
Page 97: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

Verifying VTP

NOTE: If trunking has been established before VTP is set up, VTP information is propagated throughout the switch fabric almost immediately. However, because VTP information is advertised only every 300 seconds (5 minutes), unless a change has been made to force an update, it can take several minutes for VTP information to be propagated.

Page 98: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

Inter-VLAN Communication Using an External Router:Router-on-a-Stick

NOTE: The subnets of the VLANs are directly connected to the router. Routing between these subnets does not require a dynamic routing protocol. In a more complex topology, these routes need to either be advertised with whatever dynamic routing protocol is being used or be redistributed into whatever dynamic routing protocol is being used.NOTE: Routes to the subnets associated with these VLANs appear in the routing table as directly connected networks.

Page 99: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

Inter-VLAN Communication Tips• Although most routers support both ISL and dot1q encapsulation, some switch models only support dot1q (the 2950 and 2960 series, for example).• If you need to use ISL as your trunking protocol, use the command encapsulation isl x, where x is the number of the VLAN to be assigned to that subinterface.• Recommended best practice is to use the same number of the VLAN number for the subinterface number. It is easier to troubleshoot VLAN 10 on subinterface fa0/0.10 than on fa0/0.2.• The native VLAN (usually VLAN 1) cannot be configured on a subinterface for Cisco IOS Software releases that are earlier than 12.1(3)T. Native VLAN IP addresses therefore need to be configured on the physical interface. Other VLAN traffic is configured on subinterfaces:Router(config)#interface fastethernet 0/0Router(config-if)#encapsulation dot1q 1 nativeRouter(config-if)#ip address 192.168.1.1 255.255.255.0Router(config-if)#interface fastethernet 0/0.10Router(config-subif)#encapsulation dot1q 10Router(config-subif)#ip address 192.168.10.1 255.255.255.0 Configuration Example: Inter-VLAN CommunicationFigure 11-1 illustrates the network topology for the configuration that follows, which shows how to configure inter-VLAN communication using commands covered in this chapter Some commands used in this configuration are from previous chapters.Figure 11-3 Network Topology for Inter-VLAN Communication Configuration

Page 100: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

ISP Router

Page 101: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2
Page 102: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2
Page 103: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2
Page 104: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2
Page 105: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2
Page 106: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

18. STP and Ether Channel:

This chapter provides information and commands concerning the following topics:• Spanning Tree Protocol— Enabling Spanning Tree Protocol— Configuring the root switch— Configuring a secondary root switch— Configuring port priority— Configuring the path cost— Configuring the switch priority of a VLAN— Configuring STP timers— Verifying STP— Optional STP configurations— Changing the spanning-tree mode— Extended System ID— Enabling Rapid Spanning Tree— Troubleshooting Spanning Tree— Configuration example: STP• EtherChannel— Interface modes in EtherChannel— Guidelines for configuring EtherChannel— Configuring Layer 2 EtherChannel— Verifying EtherChannel— Configuration example: EtherChannelSpanning Tree ProtocolEnabling Spanning Tree Protocol

Page 107: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

NOTE: If more VLANs are defined in the VLAN Trunking Protocol (VTP) than there are spanning-tree instances, you can only have STP on 64 VLANs. If you have more than 128 VLANs, it is recommended that you use Multiple STP.

Configuring the Root Switch

Page 108: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2
Page 109: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2
Page 110: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

NOTE: With the priority keyword, the range is 0 to 61440 in increments of 4096.The default is 32768. The lower the priority, the more likely the switch will be chosen as the root switch.Only the following numbers can be used as a priority value:

CAUTION: Cisco recommends caution when using this command. Cisco further recommends that the spanning-tree vlan x root primary or the spanning-tree vlan x root secondary command be used instead to modify the switch priority.

Page 111: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

Configuring STP Timers

NOTE: For the hello-time command, the range is 1 to 10 seconds. The default is 2 seconds.For the forward-time command, the range is 4 to 30 seconds. The default is 15 seconds.For the max-age command, the range is 6 to 40 seconds. The default is 20 seconds.CAUTION: Cisco recommends caution when using this command. Cisco further recommends that the spanning-tree vlan x root primary or the spanning-tree vlan x root secondary command be used instead to modify the switch timers.

Verifying STP

Optional STP ConfigurationsAlthough the following commands are not mandatory for STP to work, you might find these helpful to fine-tune your network.

Page 112: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

PortFast

BPDU Guard

Changing the Spanning-Tree Mode

Page 113: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

Different types of spanning tree can be configured on a Cisco switch. The options varyaccording to the platform:• Per-VLAN Spanning Tree (PVST)—There is one instance of spanning tree for each VLAN. This is a Cisco proprietary protocol.• Per-VLAN Spanning Tree Plus (PVST+)—Also Cisco proprietary. Has added extensions to the PVST protocol.• Rapid PVST+—This mode is the same as PVST+ except that it uses a rapid convergence based on the 802.1w standard.• Multiple Spanning Tree Protocol (MSTP)—IEEE 802.1s. Extends the 802.1w Rapid Spanning Tree (RST) algorithm to multiple spanning trees. Multiple VLANs can map to a single instance of RST. You cannot run MSTP and PVST at the same time.

Page 114: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2
Page 115: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

Configuration Example: STPFigure 12-1 illustrates the network topology for the configuration that follows, which showshow to configure STP using commands covered in this chapter.Figure 12-4 Network Topology for STP Configuration Example

Page 116: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2
Page 117: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2
Page 118: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

EtherChannelEtherChannel provides fault-tolerant, high-speed links between switches, routers, and servers. An EtherChannel consists of individual Fast Ethernet or Gigabit Ethernet links bundled into a single logical link. If a link within an EtherChannel fails, traffic previously carried over that failed link changes to the remaining links within the EtherChannel.

Page 119: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

Interface Modes in EtherChannel

Guidelines for Configuring EtherChannel• PAgP is Cisco proprietary.• LACP is defined in 802.3ad.• You can combine from two to eight parallel links.• All ports must be identical:— Same speed and duplex— Cannot mix Fast Ethernet and Gigabit Ethernet— Cannot mix PAgP and LACP— Must all be VLAN trunk or nontrunk operational status• All links must be either Layer 2 or Layer 3 in a single channel group.• To create a channel in PAgP, sides must be set to— Auto-Desirable— Desirable-Desirable• To create a channel in LACP, sides must be set to— Active-Active— Active-Passive• To create a channel without using PAgP or LACP, sides must be set to On-On.• Donot configure a GigaStack gigabit interface converter (GBIC) as part of an EtherChannel.• An interface that is already configured to be a Switched Port Analyzer (SPAN) destination port will not join an EtherChannel group until SPAN is disabled.• Donot configure a secure port as part of an EtherChannel.• Interfaces with different native VLANs cannot form an EtherChannel.• When using trunk links, ensure all trunks are in the same mode—Inter-Switch Link (ISL) or dot1q.

Page 120: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

Configuring Layer 2 EtherChannel

Verifying EtherChannel

Configuration Example: EtherChannelFigure 12-2 illustrates the network topology for the configuration that follows, which shows how to configure EtherChannel using commands covered in this chapter.Figure 12-5 Network Topology for EtherChannel Configuration

Page 121: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2
Page 122: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2
Page 123: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2
Page 124: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2
Page 125: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

19. Creating a Network Map using CDP:This chapter provides information and commands concerning the following topic:• Cisco Discovery Protocol (CDP)

Cisco Discovery Protocol

Page 126: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2
Page 127: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

CAUTION: Although CDP is necessary for some management applications, CDP should still be disabled in some instances.

Disable CDP globally if• CDP is not required at all.• The device is located in an insecure environment.Use the command no cdp run to disable CDP globally:

RouterOrSwitch(config)#no cdp run

Disable CDP on any interface if• Management is not being performed.• The switch interface is a nontrunk interface.• The interface is connected to a nontrusted network.Use the interface configuration command no cdp enable to disable CDP on a specific interface:

RouterOrSwitch(config)#interface fastethernet 0/1RouterOrSwitch(config-if)#no cdp enable

Page 128: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

20. Basic Troubleshooting

This chapter provides information and commands concerning the following topics:• Viewing the routing table• Determining the gateway of last resort• Determining the last routing update• OSI Layer 3 testing• OSI Layer 7 testing• Interpreting the show interface command• Clearing interface counters• Using CDP to troubleshoot• The traceroute command• The show controllers command• debug commands• Using time stamps• Operating system IP verification commands• The ip http server command• The netstat command

Viewing the Routing Table

Determining the Gateway of Last Resort

NOTE: The ip default-network command is for use with the deprecated Cisco proprietary Interior Gateway Routing Protocol (IGRP). Although you can use it with Enhanced Interior Gateway Routing Protocol (EIGRP) or RIP, it is not recommended.

Page 129: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

Use the ip route 0.0.0.0 0.0.0.0 command instead.Routers that use the ip default-network command must have either a specific route to that network or a 0.0.0.0 /0 default routes.Determining the Last Routing Update

OSI Layer 3 Testing

NOTE: See Chapter “The ping and traceroute Commands,” for all applicable ping commands.OSI Layer 7 TestingNOTE: See Chapter “Telnet and SSH,” for all applicable Telnet commands.

Interpreting the show interface Command

Page 130: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

Clearing Interface Counters

Using CDP to TroubleshootNOTE: See Chapter “Telnet and SSH” for all applicable CDP commands.The traceroute Command

NOTE: See Chapter for all applicable traceroute commands.The show controllers Command

Debug Commands

Page 131: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

CAUTION: Turning all possible debugging on is extremely CPU intensive and will probably cause your router to crash. Use extreme caution if you try this on a production device. Instead, be selective about which debug commands you turn on.Do not leave debugging turned on. After you have gathered the necessary information from debugging, turn all debugging off. If you want to turn off only one specific debug command and leave others on, issue the no debug x command, where x is the specific debug command you want to disable.

Using Time Stamps

TIP: Make sure you have the date and time set with the clock command at privileged mode so that the time stamps are more meaningful.Operating System IP Verification Commands

Page 132: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

The following are commands that you should use to verify what your IP settings are. Different operating systems have different commands.• ipconfig (Windows 2000/XP):Click Start > Run > Command > ipconfig oripconfig/all.• winipcfg (Windows 95/98/Me):Click Start > Run > winipcfg.• ifconfig (Mac/Linux):#ifconfigThe ip http server Command

CAUTION: The HTTP server was introduced in Cisco IOS Software Release 11.0 to extend router management to the web. You have limited management capabilities to your router through a web browser if the ip http server command is turned on. Does not turn on the ip http server command unless you plan to use the browser? Interface for the router. Having it on creates a potential security hole because another port is open.The netstat Command

26. Configuration a DHCPThis chapter provides information and commands concerning the following topics:• Configuring DHCP• Verifying and troubleshooting DHCP configuration• Configuring a DHCP helper address• DHCP client on a Cisco IOS Software Ethernet interface• Configuration example: DHCPConfiguring DHCP

Page 133: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

Verifying and Troubleshooting DHCP Configuration

Page 134: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

Configuring a DHCP Helper Address

NOTE: The ip helper-address command will forward broadcast packets as a unicast to eight different UDP ports by default:• TFTP (port 69)• DNS (port 53)• Time service (port 37)• NetBIOS name server (port 137)• NetBIOS datagram server (port 138)• Boot Protocol (BOOTP) client and server datagrams (ports 67 and 68)• TACACS service (port 49)If you want to close some of these ports, use the no ip forward-protocol udp x command at the global configuration prompt, where x is the port number you want to close. The following command stops the forwarding of broadcasts to port 49:Router(config)#no ip forward-protocol udp 49If you want to open other UDP ports, use the ip forward-helper udp x command, where x is the port number you want to open: Router(config)#ip forward-protocol udp 517DHCP Client on a Cisco IOS Software Ethernet Interface

Page 135: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

Configuration Example: DHCPFigure 15-1 illustrates the network topology for the configuration that follows, which shows how to configure DHCP services on a Cisco IOS router using the commands covered in this chapter.Figure 15-4 Network Topology for DHCP Configuration

Page 136: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2
Page 137: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2
Page 138: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2
Page 139: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

Lab 27:

This chapter provides information and commands concerning the following topics:• Configuring HDLC encapsulation on a serial line• Configuring PPP on a serial line (mandatory commands)• Configuring PPP on a serial line (optional commands), including thosecommands concerning the following— Compression— Link quality— Multilink— Authentication• Verifying or troubleshooting a serial link/PPP encapsulation• Configuration example: PPP

Configuring HDLC Encapsulation on a Serial Line

NOTE: HDLC is the default encapsulation for synchronous serial links on Cisco routers. You would only use the encapsulation hdlc command to return the link to its default state.Configuring PPP on a Serial Line (Mandatory Commands)

NOTE: You must execute the encapsulation ppp command on both sides of the serial link for the link to become active.

Configuring PPP on a Serial Line (Optional Commands): Compression

Configuring PPP on a Serial Line (Optional Commands): Link Quality

Page 140: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

NOTE: In PPP, the Link Control Protocol allows for an optional link-quality determination phase. In this phase, the link is tested to determine whether the link quality is sufficient to bring up any Layer 3 protocols. If you use the command ppp quality x, where x is equal to a certain percent, you must meet that percentage of quality on the link. If the link does not meet that percentage level, the link cannot be created and will shut down.Configuring PPP on a Serial Line (Optional Commands): Multilink

Configuring PPP on a Serial Line (Optional Commands):

Authentication

TIP: When setting authentication, make sure that your usernames match the name of the router on the other side of the link, and that the passwords on each router match the other. Usernames and passwords are case sensitive. Consider the following example:

Page 141: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

NOTE: Because PAP does not encrypt its password as it is sent across the link, recommended practice is that you use CHAP as your authentication method.

Verifying or Troubleshooting a Serial Link/PPP Encapsulation

TIP: With frequent lab use, serial cable pins often get bent, which might prevent the router from seeing the cable. The output from the command show controllers interface serial x shows no cable even though a cable is physically present.Configuration Example: PPPFigure 16-1 illustrates the network topology for the configuration that follows, which shows how to configure PPP using the commands covered in this chapter.Figure 16-1 Network Topology for PPP Configuration

Page 142: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2

NOTE: The host name, password, and interfaces have all been configured as per the configuration example in Chapter 6, “Configuring a Single Cisco Router.” Boston Router

Page 143: Web viewComputer Communication & Computer Networks. Laboratory Manual . Table of contents. LAB . Number LAB NAME Page Number Lab1 Introduction to Lab Equipment Lab 2