Clock Configuration
650) this. width = 650; "src =" http://www.bkjia.com/uploads/allimg/131227/0454301F6-0.png "title =" 1.png"/>
1. Configure vroa A (assuming vroa A is the DCE end of the serial line)
Router> en
Router # conf t
Router (config) # host Router
Routeconfig # int s0/0
Routeconfig-if # ipad 192.168.1.1255.255.255.0
Roupid (config-if) # clock rate 64000
Routeconfig-if # noshutdown
Roupid (config-if) # exit
2. Configure vrob B (assuming vrob B is the DTE end of the serial line)
Router
protocol is down
Internet protocol processing disabled
My3377 # show int s2/1
Serial/1 is up, line protocol is down
Hardware is M4T
MTU 1500 bytes, BW 1544 Kbit, DLY 20000 usec,
Reliability 255/255, txload 1/255, rxload 1/255
Encapsulation HDLC, crc 16, loopback not set
Keepalive set (10 sec)
Restart-Delay is 0 secs
Last input never, output 00:00:08, output hang never
Last clearing of "show interface" counters never
Input queue: 0/75/0/0 (size/max/dr
standardization process. It stores the X.25 link layer HDLC frame format, but does not adopt the LAPB procedure, in accordance with the ISDN standard, call control signaling independent of the user data channel, namely the LAPD procedure, implements switching at the link level (frame level) (X.25 at the network layer ).
The frame length in the frame Frame Relay Network is variable, and the maximum length can be more than 1000 bytes. Each frame contai
to IS-IS Routing ProtocolIS-IS can run on Point-to-Point Links, such as PPP and HDLC, or Broadcast Links, such as Ethernet and Token-Ring, for NBMA (Non-Broadcast Multi-Access) networks, such as ATM, You need to configure the sub-interface for it and set the sub-interface type to P2P or Broadcast network. IS-IS cannot run on a Point to Multi Point Links.3. IS-IS routing protocol structureTo support large-scale routing networks, IS-IS uses two layers
view the routing table. This concept is also important and requires understanding of commonly used routing algorithms. And the whole TCP protocol is more complex, and the link layer protocol is somewhat similar, there are some important mechanisms or concepts need to be carefully understood, such as number and confirmation, flow control, resend mechanism, send acceptance window.Basic model and concept of TCP/IPPhysical LayerDevice, repeater (repeater), hub (hub). For this layer, data received f
.
Slin (n> = 0)
SLIP (Serial Line Interface Protocol) interface, where n is an integer starting from 0.
Ipppn (n> = 0)
Use the synchronous PPP interface of ISDN. n is an integer starting from 0.
Isdnn (n> = 0)
ISDN (integrated business Digital Network) interface. However, the ISDN interface can only be used by IPTraf if it is named isdnn. IPTraf supports synchronous PPP interfaces, original IP addresses, and Cisco-HDLC encapsulation.
end matches the CSU/DSU interface. Common Serial cable standards include V.24, V.35, X.21, RS-232, RS-449, RS-530, etc. Depending on the physical interface, cables are also divided into DTE and DCE. The router uses the DTE cable to connect to CSU/DSU. The device can automatically detect the external cable type of the synchronous serial port and select the electrical characteristics. Generally, no manual configuration is required. CSU/DSU is connected to the carrier network through an access cab
CCNP Study Notes 2-routing part-VPNReview the dynamic protocol: rip vpn ospf encapsulation UDP 520 IP 88 IP 89 update address 224.0.0.9 224.0.0.10 224.0.0.5/6 use passive to implement intercommunication between the two ends of unicast neighbor and the output interface to implement unicast NBMA point to multicast unicast key complete neighbor update methods, timing 30 seconds 15% offset, trigger incremental update, trigger timing 30 minutes trigger AD 120 5 90 170 metric hops 5 k value default va
P2P recursive table queries caused by P2P environments. Associated interface: Suitable for P2P/point-to-point (HDLC and PPP), which is used to generate a large number of ARP packets in the MA environment. Optimal Solution: configure the next hop address and the outbound interface at the same time. Ii. Use Static Routing to implement route filtering 1. Note that in a routing protocol, an interface is advertised to this Protocol to send and receive pac
1 , standard network hierarchyThe network is divided from bottom to top: physical layer, Data link layer, network layer, transport layer, Session layer, presentation layer and application layer.The following diagram attempts to show the location of the different TCP/IP and other protocols in the original OSI model:
7
Application Layer
such as HTTP, SMTP, SNMP, FTP, Telnet, SIP, SSH, NFS, RTSP, XMPP, Whois, ENRP
6
Presentation Layer
such as XDR, ASN
The difference between HTTP, TCP/IP protocol and socketThe following diagram attempts to show the location of the different TCP/IP and other protocols in the original OSI model:
7
Application Layer
such as HTTP, SMTP, SNMP, FTP, Telnet, SIP, SSH, NFS, RTSP, XMPP, Whois, ENRP
6
Presentation Layer
such as XDR, ASN.1, SMB, AFP, NCP
5
Session Layer
For example ASAP, TLS, SSH, ISO 8327/ccitt x.225, RPC, NetBIOS, ASP, Winsock,
Protocol, point-to-Point Protocol) or HDLC (high-level The data link control, the high-level protocol, is used for point-to-point lines, that is, a single cable is connected to only two devices, one end is issued, and the other end can be received. Assuming that the PPP protocol is used on the serial cable, the source and destination addresses of the data Link layer package are PPPData-link-layer-encapsulated data frames are passed to the physical la
Definition: A set of rules, standards, or conventions established by a network protocol for data exchange in a computer network.Features: Semantics, syntax, timing.Hierarchy: The application layer (application layer) presentation layer (Presentation layer) session Layer Transport layer (Transport layer) network layer Layer) Data Link Layer physical layer (Physics layer)Common protocols: TCP/ipnetbeuiipx/spxDivision: Physical Layer: Ethernet/Modem/powerline communication (PLC) · SONET/SDH g.709 •
Interface FDM (Frequency Division Multiplexing frequency Division multiplexing fiber optic cable optical cable FIFO replacement policy first-out substitution algorithm Figure digital Graphics final most After the final first normal form primary paradigm floppy Active platter (floppy disk) foreign key domain tuple foreign key range tuple form Shape Form Formula Formula Expression Foundation Based on the Fund frame page frame frame structure pages structure frequency frequency FTP File Transfer s
A few words to master subnet mask, IP address, host number, network number, network address, broadcast address1, 191.172.16.10.33/27 in the/27 that is, the subnet mask is 255.255.255.224 that is 27 full 12. From the subnet mask 255.255.255.252 to obtain its network bit is 30 bits, so only the remaining 2-bit master, the host bit of all zeros for the network address, the host bit all 1 is the broadcast address, the remaining host number is the host address range3. Public address is the responsibi
sense Multiple Access with collision Detection) Carrier monitor multipoint access/Collision detection protocol. General line Network, the essence of the Protocol is carrier monitoring and collision detection. The carrier monitoring is to send data before the detection of the bus on the other computers in the transmission of data, such as temporarily do not send data, to avoid collisions. Collision detection for the computer side to send data edge detection channel signal voltage size.The PPP (p
) only supports full duplexThe reliable transport protocol that was used at the data link layer was HDLC (high-level data link control, high-level)A.PPP protocol features (needs to be met):• Simple receive frame->CRC checksum drop/receive (does not provide reliable transmission, reliable transmission is done by TCP)• Encapsulate frames to specify special characters as frame delimiters• Transparency• Multiple network layer protocols and multiple link t
The usual encapsulation technology is the encapsulation of Ethernet, PPP and HDLC, Ethernet is often used for the connection between LAN, and the latter two are commonly used in the encapsulation of WAN.PPP Authentication configuration:1 Package PPP Association.Encapsulation PPP2 record the peer-to-peer router name and password on this router.Rejie (config) #username ...Password ...3 Set the local router name and password.Hostname ...Enable Secret ...
using a Web browser, and the Web server sends the requested information to the client.The following diagram attempts to show the location of the different TCP/IP and other protocols in the original OSI model:
7
Application Layer
such as HTTP, SMTP, SNMP, FTP, Telnet, SIP, SSH, NFS, RTSP, XMPP, Whois, ENRP
6
Presentation Layer
such as XDR, ASN.1, SMB, AFP, NCP
5
Session Layer
For example ASAP, TLS, SSH, ISO 8327/ccitt x.225,
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.