Introduction to Cisco Router Configuration
Chapter 1 - The Internetworking Model
Objectives
Upon completion of this chapter, you will be able to:
- Discuss the major influences of user requirements on
network evolution.
- Identify at least three reasons why the industry uses a
layered network model.
- Identify the functions of each layer of the
ISO/OSI
reference model.
- Define and explain the five conversion steps of data
encapsulation.
Summary
- Internetworking evolves to support current and future
applications.
- The OSI reference model organizes network functions into
seven categories called layers.
- Data flows from upper-level user applications to
lower-layer bit stransmitted over network media.
- Peer-to-peer functions use encapsulation and
de-encapsulation at layer interfaces.
- Most network manager tasks configure the lower three
layers.
Excercise
Problem 1
Objective: Identify at least three reasons why the
industry uses a layered network model.
Write at least three reasons why the industry uses a layered
network model.
- _______
- _______
- _______
Problem 2
Objective: Identify the functions of each layer of the
ISO/OSI reference model.
As your instructor reads a layer's function in the ISO/OSI
reference mode, write that layer's name in the appropriate
numbered box in the seven-layer rectangle below:
Problem 3
Objective: Define and explain the five conversion
steps of data encapsulation.
When a user's information is converted into hits that hardware
can use, five conversion steps can occur. Write these five steps
on the line provided below; include a brief description of what
occurs during each conversion step. The first and last steps are
provided as your reference.
- User information is converted to _______
- _______ is converted to _______
- _______ are converted to _______
- _______ are converted to _______
- _______ are converted to bits.
Solutions
Chapter 2 - Applications and Upper Layers
Objectives
Upon completion of this chapter, you will be able to:
- Name and describe computer, network, and internetwork
applications.
- Decribe the OSI presentation functions and identify
common standards.
- Describe the OSI session functions and identify common
standards.
- Describe the OSI transport functions for end-to-end
network services.
- Identify common processes for establishing connections,
flow control, and windowing.
Summary
- The ISO/OSI reference model describes network
applications.
- Presentation layer formats and converts network
application data to represent text, graphics, images,
video, and audio.
- Session-layer functions coordinate communication
interactions between applications.
- Reliable transport-layer functions include
- Multiplexing
- Connection synchronization
- Flow control
- Error recovery
- Reliability through windowing
Exercise
Problem 1
Objective: Name and describe computer, network, and
internetwork applications.
Early in this chapter, the presentation distinguished between
various applications types. Write three examples of network
applications and three examples of internetworking applications;
include a brief description of what each application does.
- Network Applications:
_______
- Internetworking Applications:
_______
Problem 2
Objective: Describe the OSI presentation functions and
identify common standards.
Write a description of the OSI presentation-layer functions. Then
write the names of at least two presentation-layer standards or
types.
_______
Problem 3
Objective: Describe the OSI session functions and
identify common standards.
Write a description of the OSI session-layer functions. Then
write the names of at least two session-layer standards.
_______
Problem 4
Objective: Describe the OSI transport functions for
end-to-end network services.
The transport function in the ISO/OSI reference model extends
services across some portion of the topology shown below. Circle
the letter of the brace that indicated the correct extent of
transport services.

Problem 5
Objective: Identify common processes for establishing
connections, flow control, and windowing.
- Telnet and FTP can share a Layer 4 connection. What
process allows this?
_______
- Data can be lost if a host on one side is allowed to send
so many segments that the other-side host overflows its
buffers. Write the name of the generic process used to
avoid this problem.
_______
- TCP enables reliability by using windowing. List two
mechanisms that work with windowing to help ensure
delivery of segments without duplication and data loss.
_______
Solutions
Chapter 3 - Physical and Data Link Layers
Objectives
Upon completion of this chapter, you will be able to:
- Identify and describe the data link sublayers and their
functions.
- Explain the use of MAC addresses.
- Describe the topology and functionality of LANs.
- Differentiate between LAN and WAN protocols.
- Describe the characteristics of WAN-based protocols.
Summary
- The ISO/OSI reference model describes network
applications.
- Presentation layer formats and converts network
application data to represent text, graphics, images,
video, and audio.
- Session-layer functions coordinate communication
interactions between applications.
- Reliable transport-layer functions include
- Multiplexing
- Connection synchronization
- Flow control
- Error recovery
- Reliability through windowing
Exercise: MAC Addresses
Objective: Explain the use of MAC addresses.
Complete the table to show what address each device would have
for another device.
Host A addresses:
- for host B ....
- for host D ....
Host B addresses:
- for host A ....
- for host D ....
Host D addresses:
- for host A ....
- for host B ....
Router C addresses:
- for host A ....
- for host B ....
- for host D ....
Exercise: Common LAN Technologies
Objective: Describe the topology and functionality of
LANs.
Complete the following table to contrast Ethernet, Token Ring,
and FDDI LAN technologies.
|
Ethernet |
Token Ring |
FDDI |
Cable and speed |
|
|
|
Router interface abbreviation
(before the number) |
|
|
|
Summary
- The physical layer provides access to the wires of an
internetwork.
- The data link layer provides support for communication
over several types of data links:
- LAN (Ethernet / IEEE 802.3, Token Ring / IEEE
802.5, FDDI).
- Dedicated WAN (SDLC, HDLC, PPP, LAPB).
- Switched WAN (X.25, Frame Relay, ISDN).
Exercise: Physical and Data Link Layers
Problem 1
Objective: Identify and describe the data link
sublayers and their functions.
In the diagram, fill in the layer and sublayer names of the OSI
model on the space provided inside each restangle. Then on the
lines provided, write a brief description of the function
performed by sublayers A and B.
A) ....
B) ....
Problem 2
Refer to the diagram in problem 1. Assume you have a logical
address used by the function in Layer 3. Name a method used to
find a device address used by the function in Layer 2. Write your
answer on the line below.
....
Problem 3
Objective: Differentiate between LAN and WAN
protocols.
Objective: Describe the characteristics of WAN-based protocols.
Entries in the table below list the names of a LAN or WAN
protocol or standard in column 1. Column 2 statements summarize a
LAN or WAN topology, function, or characteristic. In the left
column (labeled Write Letters) write two answer letters in each
space:
- Write L if the protocol or standard is used on LANs, or
write a W if it is used on WANs.
- Also wrote the letter identifying the correct statemtns
in column 2 that describes the given protocol or
standard.
For example, for item 2, write W followed by C in the blakc
space if you think item 2's protocol or standard is used on a WAN
and summarized in item C.
Note Column 2 intentionally contains extra
statements.
Write Letters |
Column 1 Protocol or Standard |
Column 2 Topology, Function, or
Characteristic. |
1. ... |
SDLC |
A) Equivalent of IEEE 802.5. |
2. ... |
EIA/TIA-232 |
B) Either side can initiate connection
to access link. |
3. ... |
802.3 |
C) Voice-grade access, formerly a
recommended standard. |
4. ... |
Frame Relay |
D) Uses primary and secondary roles for
IBM data links. |
5. ... |
Ethernet II |
E) From original Xerox work; uses field
for protocol type. |
6. ... |
ISDN |
F) Emerging standard to provide TCP/IP
internet access. |
7. ... |
HDLC |
G) Proprietary version of a default
protocol for Cisco routers |
8. ... |
Token Ring |
H) From IEEE efforts; uses field for
length rather than type. |
9. ... |
FDDI |
I) Uses simplified HDLC for higher-speed
communication. |
|
|
J) Uses four-bit symbols rather ahtn
octets in its framing. |
|
|
K) Integrates voice and data services on
digital facilities. |
Solutions
Chapter 4 - Network Layer and Path Determination
Exercise: Network Layer Basics
Problem 1
Objective: List the key internetworking functions of
the OSI network layer and how they are performed in a router.
Identify three key network-layer functions and briefly describe
how a router performs these functions.
....
Problem 2
Objective: Describe the two parts of network
addressing, then identify the parts in specific protocol address
examples.
Fill in the blanks to complete the following statement:
The two general parts of a Layer 3 address are a ... part and
a ... part.
Problem 3
Identify the protocol suite and the two parts of the common
Layer 3 addresses shown:
A) 131.108.3.1 (assume a subnet mask of 255.255.0.0)
B) 1000.128 (assume a cable range of 1000-1000)
C) abadcafe.0000.0c56.de33
D) 31060004085551
Problem 4
Fill in the blanks:
A) A router keeps location information in a ....
B) The protocol that routers use to communicate locations to one
another is a ....
C) How many tables are used in multiprotocol routing? ....
Summary
- Internetworking functions of the network layer include
network addressing and best path selection for traffic.
- Network addressing uses one part to identify the path
used by the router and one part for parts or devices on
the net.
- Routed protocols direct user traffice, while
routing protocols work between reouters to
maintain path tables.
- Network discovery for distance vector involves exchange
of routing tables; problems can include slower
convergence.
- For link-state, routers calculate the shortest parhs to
other routers; problems can include inconsistent updates.
- Balanced hybrid routing uses attributes of both
link-state and distance vector, applying paths to several
protocols.
Exercise: Network Layer and Path Determination
Problem 1
Objective: Contrast the network discovery and update
processes in distance vector routing with those in link-state
routing.
Fill in the blank lines in the graphic below with the letter of
the statement of the statement that best describes that aspect of
the routing protocol type. For example, enter the letter C in the
Discovery box for Distance Vector Routing if you think that
distance vector routing develops a view from neighbor routers'
perspective.
Distance
Vector Routing |
Discovery
_______ |
Topology Change
_______ |
Convergence
Time
_______ |
|
Link-State
Routing |
Discovery
_______ |
Topology Change
_______ |
Convergence
Time
_______ |
|
Note You will not find a place for every
statement.
A) Starts from a common view of internetworking topology.
B) Uses periodic updates, resulting in relatively slow
convergence.
C) Develops a view from neighbor routers' prespectives.
D) Provides end-to-end load sharing.
E) Passes an updated routing table from neighbor to neighbor.
F) Events trigger updates for relatively fast convergence.
G) Processes updates in parallel with other routers.
H) Uses distance vector metrics and change-based updates.
Problem 2
Objective: List problems that each routing type
encounters when dealing with topology changes, and describe
techniques to reduce the number of these problems.
List one routing problem and indicate what type of routing is
most likely to have the problem. Then list at least two
techniques to solve (or reduce) that problem.
....
Problem 3
Objective: Explain the services of separate and
integrated multiprotocol routing.
Describe at least one key difference between a separate
multiprotocol routing environment and an integrated multiprotocol
environment.
....
Problem 4
In the graphic, the ractangle identified as circle A shows a
simplified Ethernet II frame. Other rectangles inside this frame
represent encapsulations from various layers of TCP/IP. Identify
these encapsulated components. Write the name for each component
on the line pointing to the circled letter of the component. For
example, the correct answer for the Ethernet II frame is provided
on the line for component A.
Problem 5
Refer to the diagram shown in the problem 4. The following
information represents part of the contents possible for TCP/IP
layers. Each item on the list refers to a layer transition as
information is decapsulated:
- The packet carries IP.
- Use Trivial File Transfer Protocol (TFTP).
- The program begins using the port number 20.
- Use the IP protocol number 17 (User Datagram Protocol).
- The destination interface is 00000c123456; the source is
00000c135791.
On the following space provided, match the number of the
contents description with its component letter. For example,
write the answer 2 next to the letter D if Use Trivial File
Transfer Protocol (TFTP) is your answer for layer transition
information that component D could contain.
Note The numbered list of content
descriptions intentionally contains an extra statement.
A) ____________
B) ____________
C) ____________
D) ____________
Problem 6
A) EIGRP and ISIS are examples of a new approach called
_______.
B) Must the router be configured with network-layer addresses
for most protocols? [ ] Yes [ ] No
C) Does the network-layer logical address change over each
link? [ ] Yes [ ] No
D) What does ARP stand for and what does it do? _______
E) Is a frame routable? [ ] Yes [ ] No
Solutions
|